twisteroidambassador / udpackLinks
UDPack is an extensible generic UDP packet obfuscator.
☆21Updated 6 years ago
Alternatives and similar repositories for udpack
Users that are interested in udpack are comparing it to the libraries listed below
Sorting:
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Some NSE scripts to search information from routers☆35Updated 10 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 9 years ago
- Exploit Reliability Testing System☆35Updated 10 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Updated 10 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- ☆31Updated 9 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49Updated 8 years ago
- For BurpSuite Plugins☆10Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- Python Application to Reverse Freezing☆36Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Static and Dynamic exploit analysis framework.☆23Updated 11 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Updated 10 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- Proof-of-Concept code for exploits☆82Updated 9 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Updated 9 years ago
- Script to find exploitable magic methods for PHP object injection☆27Updated 11 years ago