☆147Sep 6, 2016Updated 9 years ago
Alternatives and similar repositories for houseofkeys
Users that are interested in houseofkeys are comparing it to the libraries listed below
Sorting:
- A collection of static SSH keys (public and private) that have made their way into software and hardware products.☆853Feb 13, 2025Updated last year
- Private keys that have become public ...☆185Updated this week
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Jan 5, 2021Updated 5 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- ☆19Jun 29, 2012Updated 13 years ago
- ☆14Jun 7, 2017Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Certificate Transparency stuff☆14Jul 16, 2021Updated 4 years ago
- Pipe for using the CANBus Triple with Wireshark☆12Oct 29, 2015Updated 10 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Easy 802.1Q VLAN Hopping☆80Jul 23, 2024Updated last year
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Wormhole Docker base image (Based on Ubuntu 14.04)☆18Apr 4, 2016Updated 9 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- A tool to generate graph and other output from NMAP XML files☆116Mar 9, 2019Updated 7 years ago
- Python Application to Reverse Freezing☆36Jul 21, 2016Updated 9 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- A scanner for SIP proxies vulnerable to Shellshock☆112Aug 13, 2016Updated 9 years ago
- Instant negative hash cracking wordlist lookup☆13Jul 7, 2017Updated 8 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Database of private SSL/SSH keys for embedded devices☆269Feb 9, 2024Updated 2 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Stuff for the DEFCON 24 Car Hacking Village Badge☆13Sep 4, 2016Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,865Jun 28, 2024Updated last year
- ☆45Feb 24, 2018Updated 8 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago