skulltech / netmog
A netcat alternative with remote code execution.
☆39Updated 4 years ago
Alternatives and similar repositories for netmog:
Users that are interested in netmog are comparing it to the libraries listed below
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆67Updated 5 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 4 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated last year
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆94Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- recover Firefox and more browsers logins☆49Updated 3 years ago
- Sources code extracted from malwares for analysis☆36Updated last year
- IDS/IPS malware download evasion☆15Updated 5 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆20Updated 4 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- python scripts for penetration testing☆11Updated 5 years ago
- Advisories and Proofs of Concept by BlackArrow☆17Updated last month
- The Albert, the smart recon tool.☆7Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- ☆43Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- NmapPy - Python implementation of Nmap☆35Updated 6 years ago
- DO NOT RUN THIS.☆47Updated 3 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 3 years ago
- A fast http and https prober, to check which URLs are alive☆69Updated 5 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆21Updated 10 years ago
- ☆17Updated 5 years ago
- Modular rootkit framework.☆27Updated 3 years ago
- Notes and helper scripts/files/etc from when I passed my OSCP☆18Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Some of my flag protected writeups☆11Updated 4 years ago
- python hash cracker☆52Updated 2 months ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago