wandering-nomad / SpidernetLinks
SSH Based Remote Administration Tool
☆104Updated 10 years ago
Alternatives and similar repositories for Spidernet
Users that are interested in Spidernet are comparing it to the libraries listed below
Sorting:
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 11 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆61Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 8 years ago
- python based backdoor software☆17Updated 13 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Projects and POCs☆60Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 11 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Data exfiltration PoC scripts☆25Updated 9 years ago