skulltech / netmogLinks
A netcat alternative with remote code execution.
☆38Updated 5 years ago
Alternatives and similar repositories for netmog
Users that are interested in netmog are comparing it to the libraries listed below
Sorting:
- recover Firefox and more browsers logins☆50Updated 3 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 7 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- ☆17Updated 5 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- A Simple PE File Heuristics Scanners☆49Updated 6 years ago
- ☆50Updated 4 years ago
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- Minimalistic DNS logging tool☆44Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Simple golang reverse shell☆21Updated 5 years ago
- Sources code extracted from malwares for analysis☆36Updated 2 years ago
- DLInjector for Graphical User Interface.☆35Updated 4 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- Yet Another Sniffer for monitoring network traffic☆85Updated 3 years ago
- A simple polymorphic engine☆21Updated 5 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 4 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- ☆21Updated 5 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- ☆30Updated 4 years ago
- ☆10Updated 7 years ago