A host based IDS written in C# Targetted at Metasploit
☆44Nov 18, 2013Updated 12 years ago
Alternatives and similar repositories for antipwny
Users that are interested in antipwny are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Elaborating process of windows provisioning in foreman☆17Apr 23, 2017Updated 8 years ago
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- ps-like .NET Assembly for enumerating processes on the current machine or a remote machine.☆13Aug 12, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- Linux Kernel Exploit, a PoC ( Proof of Concept )☆20Mar 5, 2018Updated 8 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- ☆21Apr 15, 2016Updated 10 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Small scripts and POCs related to digital forensics☆18Nov 1, 2022Updated 3 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Data exfiltration PoC scripts☆24Sep 11, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Windows/Linux - ReverseShellBackdoor Framework☆51Jun 8, 2019Updated 6 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆18Sep 7, 2019Updated 6 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Nov 27, 2017Updated 8 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Sep 12, 2016Updated 9 years ago
- glassdoor is a modern, autonomous security framework for Android APKs. POC, unmaintained unfortunately.☆14Jul 28, 2017Updated 8 years ago
- A shell / chat bot for XMPP and cloud services☆48Oct 10, 2015Updated 10 years ago
- A simple shellcode runner☆23Apr 20, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆17Jan 12, 2018Updated 8 years ago
- Binfuzz.js: A Binary Fuzzer in JavaScript☆30Aug 1, 2013Updated 12 years ago
- A fully original Windows anti-virus client from HonestRepair using the same custom antivirus engine as our Cloud.☆16Dec 19, 2019Updated 6 years ago
- Penumbra: Overture - Episode 1 (2007) by Frictional Games AB☆17May 19, 2010Updated 15 years ago
- Dirtyc0w Docker POC☆14Nov 7, 2016Updated 9 years ago
- Aurora Remote Administration Tool☆20Apr 16, 2018Updated 8 years ago
- xPress File archiver and extractor☆15Aug 16, 2019Updated 6 years ago
- Docker-based CTF Platform☆15Jul 22, 2019Updated 6 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- Simple Spyder BOT Auto Exploit Mass Local File Disclosure Joomla ( Fix Speed ) <3☆10Nov 5, 2019Updated 6 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago
- A simple rootkit to hide a process☆48Jan 10, 2014Updated 12 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- PoC of a protected process causing a blue screen if killed.☆15Jul 31, 2018Updated 7 years ago