skulltech / netmog
A netcat alternative with remote code execution.
☆38Updated 5 years ago
Alternatives and similar repositories for netmog
Users that are interested in netmog are comparing it to the libraries listed below
Sorting:
- IDS/IPS malware download evasion☆15Updated 6 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆68Updated 5 years ago
- ☆44Updated 7 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- recover Firefox and more browsers logins☆49Updated 3 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Sources code extracted from malwares for analysis☆36Updated 2 years ago
- Customizable TCP fuzzing tool to test for remote buffer overflows.☆49Updated 5 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.☆25Updated last year
- Reverse shell for remote administration☆30Updated 7 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 3 years ago
- ☆30Updated 4 years ago
- A productivity burp extension which reminds to take break while you are at work!☆17Updated 4 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Shellcode process injector☆27Updated 4 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- jgraphx 4.0.4 build for cs project☆22Updated 4 years ago
- Determine everything you need to know to about a system☆32Updated 6 years ago