wandering-nomad / Spidernet
SSH Based Remote Administration Tool
☆104Updated 9 years ago
Alternatives and similar repositories for Spidernet:
Users that are interested in Spidernet are comparing it to the libraries listed below
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- pwning & info gathering via user browser☆39Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- uses keywords from alert logs to send SMS☆24Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- python based backdoor software☆17Updated 13 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated 8 months ago