vanhoefm / blackhat17-pocs
Proof of concepts of attacks against Wi-Fi implementations
☆140Updated 6 years ago
Alternatives and similar repositories for blackhat17-pocs:
Users that are interested in blackhat17-pocs are comparing it to the libraries listed below
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆237Updated last year
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆196Updated 8 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆160Updated 5 years ago
- Decept Network Protocol Proxy☆276Updated 2 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆242Updated 10 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 6 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago
- Telnet Honeypot☆160Updated 6 years ago
- ☆89Updated 7 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆159Updated 8 years ago
- Some exploits and exploit development stuff.☆147Updated 3 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆123Updated 6 years ago
- An automated SMB relay exploitation script.☆153Updated 8 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Updated 2 years ago
- ☆220Updated 9 months ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- The first open source vulnerability scanner for firmwares☆194Updated 8 years ago
- Extract Sense out of Gibberish stuff☆82Updated 7 years ago
- Tools for 802.11 information gathering.☆119Updated 2 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆224Updated 6 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 9 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- ☆92Updated 6 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆115Updated 8 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆77Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago