rancorzinho / vbg
Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session
☆64Updated 7 years ago
Alternatives and similar repositories for vbg:
Users that are interested in vbg are comparing it to the libraries listed below
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Collection of metasploit modules☆67Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- tundeep☆42Updated 5 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- ☆73Updated 2 years ago
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆122Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- Various Scripts for Mobile Pen-testing with Frida☆76Updated 8 years ago
- Windows Remote Post Breach Tool via Telegram☆132Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- libpcap based ICMP encrypted backdoor for linux.☆130Updated 4 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- ☆138Updated 7 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆86Updated 6 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆148Updated 6 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆61Updated 8 years ago