skulltech / netmog
A netcat alternative with remote code execution.
☆38Updated 4 years ago
Alternatives and similar repositories for netmog:
Users that are interested in netmog are comparing it to the libraries listed below
- Local Privilege Escalation Miner☆26Updated 2 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Updated 6 years ago
- python hash cracker☆52Updated 4 months ago
- A Linux RAT in C☆32Updated 6 years ago
- Web Browser Hooking Framework. Manage, execute and assess web browser vulnerabilities☆39Updated 6 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated 3 months ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 7 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- recover Firefox and more browsers logins☆49Updated 3 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆68Updated 5 years ago
- ☆17Updated 5 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Simulates a logged in user.☆16Updated 8 months ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆22Updated 10 years ago
- A simple polymorphic engine☆21Updated 4 years ago
- Sources code extracted from malwares for analysis☆36Updated 2 years ago
- ☆10Updated 7 years ago
- ☆21Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- My solutions to the 2020 NSA Codebreaker Challenge☆75Updated 3 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆77Updated 5 years ago