rtsisyk / linux-iptables-contrack-exploitLinks
Bypass the Linux Netfilter using conntrack helpers
☆24Updated 10 years ago
Alternatives and similar repositories for linux-iptables-contrack-exploit
Users that are interested in linux-iptables-contrack-exploit are comparing it to the libraries listed below
Sorting:
- Repository containing many useful scripts☆74Updated 3 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- HP printer security research code☆91Updated 7 years ago
- Credentials recovery project☆10Updated 10 years ago
- The Damn Vulnerable Router Firmware Project☆30Updated 7 years ago
- public exploits☆35Updated 2 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆95Updated 2 months ago
- Nmap NSE script to identify Debian, Ubuntu, FreeBSD version based on default SSH banner response. Intended for Penentration Testing, OSC…☆33Updated 3 months ago
- ☆74Updated 6 years ago
- ☆48Updated 10 months ago
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆151Updated 5 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- HP printer security research code☆53Updated 7 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆67Updated 8 years ago
- Offline Security Focus Database☆32Updated 12 years ago
- Backdoor that listens for specially crafted ICMP packets and spawns reverse shells.☆71Updated 5 years ago
- ☆52Updated 6 years ago
- Test and exploit for CVE-2017-12542☆88Updated 7 years ago
- A minimal DNS service that can provide spoofed replies☆103Updated 2 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Updated 5 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Ye olde root shell for ye olde httpd☆44Updated 10 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- A PoC for CVE-2020-0601☆337Updated 2 years ago
- Proof of calc for CVE-2019-6453☆49Updated last year
- ☆166Updated 6 years ago