qianshanhai / q-shell
Unix remote login tool, rootkit shell tool
☆35Updated 9 years ago
Alternatives and similar repositories for q-shell:
Users that are interested in q-shell are comparing it to the libraries listed below
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- ☆73Updated 2 years ago
- Exploit collection for NT privilege escalation☆66Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 9 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Slides from previous conference talks☆41Updated 7 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Projects and POCs☆60Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆60Updated 9 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- ☆34Updated 8 years ago
- ☆17Updated 10 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago