wmbest2 / rats
☆40Updated 9 years ago
Alternatives and similar repositories for rats:
Users that are interested in rats are comparing it to the libraries listed below
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆18Updated 7 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14Updated 7 years ago
- A reverse socks5 proxy server and client☆18Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Simple SSH vulnerability scanner based on SSH Harvester☆13Updated 7 years ago
- python based backdoor software☆17Updated 13 years ago
- Mozilla scribe host policy evaluator☆14Updated 2 years ago
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Updated 8 years ago
- Massive DNS open relay scanner☆21Updated 3 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆16Updated last year
- A web app scanner☆26Updated 11 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- Scanning alive hosts of the given CIDR range in parallel.☆10Updated 5 years ago
- ARP ping detector on local network☆15Updated 12 years ago
- Build a custom Core .iso operating system with a SSH server☆12Updated 9 years ago
- another socks5 server , support linux, BSD , use epoll and kqueue technology☆12Updated 7 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 8 years ago
- Show Exploit-Database With Static HTML Automatic Generate Everyday.☆13Updated 3 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 7 years ago
- A collection of shellcodes☆68Updated 12 years ago
- Simple SSH brute-forcer written in Go☆21Updated 8 years ago
- Library to support various Hash-based Message Authentication Codes (HMAC)☆10Updated 5 months ago
- masscan result parsing, web server fingerprinting☆19Updated 2 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- moddwatch watches files and directories for modifications☆17Updated last year