techgaun / bash-backdoor
A simple backdoor in (ba)sh with encrypted communication channel
☆26Updated 8 years ago
Alternatives and similar repositories for bash-backdoor
Users that are interested in bash-backdoor are comparing it to the libraries listed below
Sorting:
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago
- MS17-010☆12Updated 7 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- Search bing with python☆12Updated 10 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- XSS payload designed to steal LastPass users' credentials☆17Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆22Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 10 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- pentest toolbox☆28Updated 2 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago