secretsquirrel / backdoor-pyc
Patch pyc files with your code. Fairly lame.
☆67Updated 9 years ago
Alternatives and similar repositories for backdoor-pyc:
Users that are interested in backdoor-pyc are comparing it to the libraries listed below
- PLASMA PULSAR☆69Updated 7 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- Exploit collection for NT privilege escalation☆66Updated 9 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 7 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- ☆73Updated 2 years ago
- ☆34Updated 8 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- Files from Zeronights presentation.☆28Updated 12 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 7 years ago
- Decrypt MITM SSL RDP and save to pcap☆53Updated 10 years ago
- ☆20Updated last year
- Fuzzbunch Python-Wine wrapper☆57Updated 7 years ago
- Exploits, Fuzzers, Scripts etc☆33Updated 4 years ago
- Unix remote login tool, rootkit shell tool☆35Updated 9 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- Slides from previous conference talks☆41Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Openssh backdoor found with a ssh honeypot☆27Updated 8 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago