yaojieno1 / AirHooperAttack
AirHopper Attack Reproduce
☆15Updated 6 years ago
Alternatives and similar repositories for AirHooperAttack:
Users that are interested in AirHooperAttack are comparing it to the libraries listed below
- Python-Based Pentesting CLI Tool☆80Updated 2 years ago
- rsGen is a Reverse Shell Payload Generator for hacking.☆78Updated 3 years ago
- Awesome webshell collection. Including 150 Github repo, and 200+ blog posts.☆170Updated 5 years ago
- mosquito - Automating reconnaissance and brute force attacks☆130Updated 5 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆137Updated 5 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆171Updated 6 years ago
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆98Updated 4 years ago
- Exploit Pack - Project☆70Updated 5 years ago
- Simple python backdoor with Ngrok tunnel support☆203Updated last year
- pFuzz helps us to bypass web application firewall by using different methods at the same time.☆158Updated 4 years ago
- Kraker is a distributed password brute-force system that focused on easy use.☆80Updated 3 years ago
- Focus on cybersecurity | collection of PoC and Exploits☆90Updated 4 years ago
- High Performance, lightweight, portable Open Source tool for mass SMBGhost Scan☆153Updated 4 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆112Updated 3 years ago
- EternalBlue Metasploit Port to various Windows Versions from Windows XP SP2 up to Windows 10 Pro☆148Updated 6 years ago
- Collection about PoC for sql injection on Joomla☆30Updated 4 years ago
- List of Awesome Red Teaming Resources☆45Updated 7 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- 🔥 Pentest Cheat Sheet☆38Updated 3 years ago
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆236Updated 4 years ago
- Reverse Shell Cheat Sheet TooL☆294Updated 4 years ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆133Updated last month
- Embedding a "UAC-Bypassing" function into your custom payload☆96Updated 2 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆244Updated last year
- A standalone, lightweight Python script for fetching IPs (or URLs) from ZoomEye search results.☆34Updated 5 months ago
- An Out-of-Band XXE server for retrieving file contents over FTP.☆180Updated 4 years ago
- Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation script☆202Updated 4 years ago
- Automate Metasploit scanning and exploitation☆115Updated 6 months ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆251Updated last year
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆201Updated 3 years ago