wandering-nomad / Spidernet
SSH Based Remote Administration Tool
☆104Updated 9 years ago
Alternatives and similar repositories for Spidernet:
Users that are interested in Spidernet are comparing it to the libraries listed below
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- ☆20Updated last year
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- ☆24Updated 6 years ago
- pwning & info gathering via user browser☆39Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Automatically scans for malicious proxies.☆29Updated 10 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago