Simply Playing
☆27Jan 17, 2024Updated 2 years ago
Alternatives and similar repositories for Nothing-
Users that are interested in Nothing- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- golang for http socks5 proxy☆20Jan 16, 2014Updated 12 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- UDP to TCP tunnel for sending datagrams through weak network☆12Jan 31, 2013Updated 13 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- A sample IE BHO for logging Internet Explorer's POST data.☆10Dec 29, 2017Updated 8 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- The LogParserPlus application, which uses Microsoft's Log Parser.☆12Jul 30, 2017Updated 8 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- GUI版 EXP☆14Mar 20, 2019Updated 7 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- 一款基于subDomainsBrute子域名爆破工具结果的处理脚本☆10Jul 28, 2017Updated 8 years ago
- Docker for CentOS Weblogic with domain☆12Jun 22, 2017Updated 8 years ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- TLS SNIp - Rule based proxy for routing/filtering TLS/SSL protocols.☆13May 3, 2017Updated 8 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- TCP port multiplexer: run multiple services through the same port☆15Sep 21, 2013Updated 12 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Harvest self-signed certs from Project Sonar Internet-wide scan files and have a look around.☆10Mar 22, 2017Updated 9 years ago
- Windows inject☆17Jun 7, 2018Updated 7 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- BlobStash's storage engine. Mirror of https://git.sr.ht/~tsileo/blobsfile☆17Apr 25, 2020Updated 5 years ago
- Low-level MS Windows registry files analysis tools☆19May 5, 2016Updated 9 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- ☆18Mar 20, 2017Updated 9 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- A POC for the Java agent of Elastic APM☆12Mar 1, 2018Updated 8 years ago
- Execute codes From XSLT☆16Dec 28, 2016Updated 9 years ago