rwhitcroft / dnschanView external linksLinks
A remote access trojan over DNS
☆97Dec 23, 2015Updated 10 years ago
Alternatives and similar repositories for dnschan
Users that are interested in dnschan are comparing it to the libraries listed below
Sorting:
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Aug 2, 2016Updated 9 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- Alina Spark - Point of Sales Trojan☆48Feb 25, 2015Updated 10 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- TDL4 style rootkit to spoof read/write requests to master boot record☆133Jan 15, 2018Updated 8 years ago
- ☆14Dec 9, 2015Updated 10 years ago
- Windows SMEP Bypass U=S☆38Apr 8, 2016Updated 9 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- Dynamic binary translation framework for instrumenting x86-64 user space Linux programs☆38May 29, 2018Updated 7 years ago
- PoC for CVE-2015-6086☆67Apr 22, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- profiling tool for analysising the games, get all the characteristic by hook d3d☆18Oct 10, 2014Updated 11 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- PyAna - Analyzing the Windows shellcode☆247Feb 16, 2016Updated 9 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆61Oct 16, 2015Updated 10 years ago
- Windows Remote Access Trojan (RAT)☆86Nov 12, 2015Updated 10 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- What Would Capstone Decode - IDA plugin that implements a Capstone powered IDA view☆57Nov 29, 2016Updated 9 years ago
- XNU Rootkit Framework☆126Jan 3, 2015Updated 11 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- A simple example of dropping a PHP backdoor on a pfSense firewall over xmlrpc.php☆20Apr 16, 2015Updated 10 years ago
- A python layer to interface with several SMTLIBv2 enabled SMT solvers☆16Apr 22, 2015Updated 10 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Android wireless karma attack detector☆67Aug 26, 2015Updated 10 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Windows Kernel Mode PCRE☆10Feb 4, 2015Updated 11 years ago
- Game Hacking Adventures Scripts & Tools☆20Dec 29, 2012Updated 13 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago