rancorzinho / vbgLinks
Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session
☆63Updated 7 years ago
Alternatives and similar repositories for vbg
Users that are interested in vbg are comparing it to the libraries listed below
Sorting:
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Updated 7 years ago
- Source Code Intelligence☆30Updated 8 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- proxy poc implementation of STARTTLS stripping attacks☆169Updated 4 years ago
- ☆74Updated 3 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Updated 9 years ago
- A simple way for detection the remote user's antivirus☆84Updated 9 years ago
- Windows Remote Post Breach Tool via Telegram☆134Updated 7 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 10 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- A shellcode testing harness.☆70Updated last year
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 9 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆56Updated 9 years ago
- ☆90Updated 8 years ago
- DNS rebinding is powerful: how to steal WiFi passwords by just tricking a victim into visiting a website, thanks to that fancy Bang & Olu…☆81Updated 6 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Updated 10 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Updated 6 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆247Updated 11 years ago
- EQGRP-Free-Files here.,☆46Updated 9 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- ~ BannerGrab☆25Updated 9 years ago
- libpcap based ICMP encrypted backdoor for linux.☆133Updated 4 years ago