Proof of Concept for Netgear Routerlogin.com exploit
☆17Feb 9, 2020Updated 6 years ago
Alternatives and similar repositories for evilrouterlogin
Users that are interested in evilrouterlogin are comparing it to the libraries listed below
Sorting:
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- const fn implementation of the SHA-2 family of hash functions☆17Oct 17, 2023Updated 2 years ago
- A GETTR API client written in Python.☆13Jul 14, 2021Updated 4 years ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro ho…☆15Feb 19, 2016Updated 10 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- Low cost ventilator based on Dr. Jeffrey Ebin's design☆22Apr 10, 2020Updated 5 years ago
- OWASP Foundation Web Respository☆20Mar 15, 2021Updated 4 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆59Dec 15, 2025Updated 2 months ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- a collection of elf file infectors☆27Oct 10, 2021Updated 4 years ago
- SSH spreading made easy for red teams in a hurry☆57Jan 1, 2024Updated 2 years ago
- Python3 Metasploit automation library☆24Dec 8, 2022Updated 3 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- executing JS from x86 code☆27May 9, 2019Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Apr 12, 2020Updated 5 years ago
- Generate an invoice PDF on the fly with Cloudflare Workers☆32Feb 21, 2026Updated 2 weeks ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Oct 1, 2019Updated 6 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- But actually for hackers☆31Mar 29, 2020Updated 5 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- (Relocated) 3d weaponry from across the globe☆10Jan 24, 2021Updated 5 years ago
- A series of python scripts and hacks for everyone. Feel free to contribute!☆34Apr 11, 2021Updated 4 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- ☆32May 26, 2025Updated 9 months ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Mar 5, 2021Updated 5 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- iOS Swift starter app integrated with Yubico SDK for iOS☆33Aug 29, 2019Updated 6 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆222Jan 18, 2020Updated 6 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆37Mar 15, 2023Updated 2 years ago
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆215May 5, 2022Updated 3 years ago
- WhatsCloud is an android app which allows you to analyze your WhatsApp chat history on the fly with only one click☆12Jul 29, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- A shellcode compiler☆41Apr 17, 2021Updated 4 years ago
- load macho files in memory without touching the Disk☆43Sep 16, 2022Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago