xtr4nge / module_squid3
FruityWifi squid3 module
☆7Updated 8 years ago
Alternatives and similar repositories for module_squid3:
Users that are interested in module_squid3 are comparing it to the libraries listed below
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Linux kernel modules developed by me for learning purposes☆19Updated 12 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- ☆46Updated 8 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆60Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 9 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- Open source exploit framework made in C#☆54Updated 3 weeks ago
- Information Security News☆61Updated last year
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Network and USB protocol fuzzing toolkit.☆35Updated 7 years ago
- Canari local transforms pcap file analysis☆31Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Updated 10 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆44Updated 8 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- SSH Based Remote Administration Tool☆105Updated 9 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆19Updated 8 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- ☆17Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Scripts that aren't PowerShell☆47Updated 5 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- Multi theaded DNS bruteforcing☆12Updated 10 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 11 years ago
- IRC bot providing assemble / disassemble for various architectures, powered by Capstone / Keystone☆15Updated last year
- This is a framework for automatically finding bugs, and exploiting them...☆5Updated 9 years ago