A collection of darkc0de old scripts (for education purposes only)
☆87May 11, 2016Updated 9 years ago
Alternatives and similar repositories for darkc0de-old-stuff
Users that are interested in darkc0de-old-stuff are comparing it to the libraries listed below
Sorting:
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Mar 13, 2019Updated 6 years ago
- #HackingTogether☆14Jan 23, 2017Updated 9 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- My CTF Challenges☆216Jan 4, 2026Updated 2 months ago
- MUTE (WxKill) is an Python Application that kills wifi signals☆10Jan 31, 2019Updated 7 years ago
- oauth2研究: 实现代码、漏洞利用、修复方案☆19May 21, 2019Updated 6 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Jun 26, 2015Updated 10 years ago
- ☆19Jul 24, 2021Updated 4 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- This is a simple program that allows you to bruteforce a protected web page where the authentication type is Basic Authentication☆11Dec 8, 2022Updated 3 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- A simple 2D game engine for Python☆10Dec 12, 2017Updated 8 years ago
- This is a basic bind shell script , containting both server and client classes, i will upgrade it with time adding new features and make …☆13Jun 11, 2025Updated 8 months ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- BASH + VIM = Cryptolocker☆11Jul 31, 2018Updated 7 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- Firefox extension which parses the headers of all the requests which are being flowing through your firefox browser to detect for vulnera…☆60Oct 28, 2018Updated 7 years ago
- Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340☆71Jun 10, 2020Updated 5 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- ☆45Jun 16, 2017Updated 8 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Python implementation of RSA reverse shell.☆11Dec 31, 2016Updated 9 years ago
- For BurpSuite Plugins☆10Jun 25, 2015Updated 10 years ago
- ☆15May 23, 2019Updated 6 years ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- ☆11Oct 8, 2025Updated 4 months ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE☆106Jul 18, 2019Updated 6 years ago
- This repository contains all the supplement material for the book "The art of sub-domain enumeration"☆662Jan 30, 2019Updated 7 years ago
- A PhantomJS script for running Wappalyzer over many sites using a headless Webkit browser☆43Mar 15, 2017Updated 8 years ago
- JWT fuzzer☆107Jul 24, 2018Updated 7 years ago
- Nmap to MongoDB☆11Mar 21, 2019Updated 6 years ago
- Python3 Reverse Shell☆13May 24, 2019Updated 6 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- browser based dynamic fuzzer☆15Dec 8, 2022Updated 3 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- An IRC based tool for testing the capabilities of a botnet.☆143Jun 30, 2020Updated 5 years ago