Python script that acts like the original sudo binary to fool users into entering their passwords
☆19Oct 2, 2016Updated 9 years ago
Alternatives and similar repositories for sudo-snooper
Users that are interested in sudo-snooper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Samsung TV Denial of Service (DoS) Attack☆36Nov 18, 2016Updated 9 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- My collection of nmap nse modules☆64Oct 19, 2019Updated 6 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Penetration Testing / OSCP Biggest Reference Bank / Cheatsheet☆13Dec 9, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Nov 25, 2016Updated 9 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆12Apr 7, 2017Updated 8 years ago
- CTF write-ups from the VulnHub CTF Team☆10Mar 23, 2018Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.☆15Jul 19, 2020Updated 5 years ago
- Development repository for the freebsd cookbook☆26Mar 2, 2026Updated 3 weeks ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 9 months ago
- Imported from https://gitorious.org/beagleboard-usbsniffer/☆15Oct 19, 2015Updated 10 years ago
- ASP.NET Core provides necessary APIs to implement secure access to an application.In this tutorial, we will see how to implement Role-Bas…☆11Aug 18, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Leveraging it is a simple matter of presenting the server with the SSH2_MSG_USERAUTH_SUCCESS message, which shows that the login already…☆14Oct 17, 2018Updated 7 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 9 years ago
- dotnetcore json based localization support☆12Dec 2, 2025Updated 3 months ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- testing123☆13Nov 23, 2024Updated last year
- Este repositorio contiene los ejemplos que muestran como usar Dapper y Entity Framework Core juntos en la misma aplicación.☆13Jul 6, 2023Updated 2 years ago
- An ABP module helps users to define and use dynamic forms at runtime.☆14Dec 19, 2025Updated 3 months ago
- A Simple PE File Heuristics Scanners☆53Mar 8, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- PHP dynamic image IP logger utilizing htaccess mod_rewrite.☆12Sep 23, 2018Updated 7 years ago
- My dotfiles for zsh, vim, i3, polybar, alacritty ...☆25Jan 20, 2026Updated 2 months ago
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- Find vulnerabilities in AD Group Policy, but do it better than Grouper2 did.☆10Nov 4, 2022Updated 3 years ago
- Remote Administration Tool☆13Jul 9, 2023Updated 2 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 9 years ago