secretsquirrel / GhostInTheNet
Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan
☆9Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for GhostInTheNet
- Undetectable Windows Payload Generation☆10Updated 6 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆13Updated 11 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 10 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- A full-fledged msfrpc library for Metasploit framework.☆12Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆12Updated 2 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 7 years ago
- SPIZZLE, The Onion Spider.☆13Updated 6 years ago
- Various exploits☆10Updated 7 years ago
- A Fast & free Windows remote administration tool.☆10Updated 2 years ago
- Collection of cracked malware☆14Updated 5 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆14Updated 4 years ago
- Software exploitation training material☆15Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆17Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 7 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆14Updated 6 years ago
- MS17-010☆12Updated 7 years ago
- Python tool for Dorking☆11Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆30Updated 3 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 10 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 4 years ago
- first commit☆10Updated 7 years ago
- Various tools i created for my own use☆10Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Automatically exported from code.google.com/p/yapscan☆11Updated 9 years ago