SQL SERVER Exploitation.
☆27Mar 18, 2017Updated 8 years ago
Alternatives and similar repositories for SQL-nightmare
Users that are interested in SQL-nightmare are comparing it to the libraries listed below
Sorting:
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 8 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Oct 10, 2015Updated 10 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Forensic Analysis Tool for Btrfs File System.☆20Aug 6, 2018Updated 7 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- Attack script and scanner for DNS based spoofed amplification attacks.☆20Oct 16, 2016Updated 9 years ago
- Example Python and R code for Cloudera Machine Learning (CML) training☆14Dec 1, 2020Updated 5 years ago
- Open-source deobfuscator for dotnetpatcher (https://bitbucket.org/3dotdev/dotnet-patcher/src/)☆23Dec 28, 2015Updated 10 years ago
- The Horrific Omnipotent Rootkit☆23Mar 17, 2017Updated 8 years ago
- 🖨️ Printer: Productivity Focused Next.js CLI Tool☆11Nov 24, 2023Updated 2 years ago
- simple reverse tcp backdoor hack☆63Oct 2, 2020Updated 5 years ago
- Lightweight DNS telemetry☆55Jan 7, 2022Updated 4 years ago
- Triton based R2 plugin for concolic execution and total control☆33Nov 26, 2018Updated 7 years ago
- Some Public Shell☆33Jun 12, 2015Updated 10 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Socks5 server over Websockets☆40Oct 17, 2018Updated 7 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- Support et TPs pour les cours de terminal/Git/Linux dispensés à l'école Hétic en Web1☆12Jan 5, 2023Updated 3 years ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆136Mar 18, 2017Updated 8 years ago
- ☆38Apr 29, 2018Updated 7 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- a SOCKS5 Client in PHP☆35Aug 5, 2020Updated 5 years ago
- Terraform module for Cloudera Manager☆11May 6, 2020Updated 5 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- 🛡 Check Windows and Control Configs and Security - CWiCCS (read as QUICKS)☆13Jan 14, 2023Updated 3 years ago
- Magma community documentation and processes☆10May 3, 2024Updated last year
- Automate Cisco LAN Switching Configuration using Ansible☆13Sep 4, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/xml2rfc-xxe☆11Jul 9, 2022Updated 3 years ago
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Feb 14, 2017Updated 9 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- Adapted OS for e-ink tablets - allows to use work-related apps with no harm for eyes☆11May 17, 2020Updated 5 years ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week