yosangwon / arp-dns-spoof
Sample code for DNS spoofing with ARP poisoning.
☆19Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for arp-dns-spoof
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- Shellcode / Buffer Overflow 💣☆18Updated 4 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Reverse shell and rootkit☆19Updated 7 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆25Updated 9 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆15Updated 7 years ago
- pentest toolbox☆28Updated 2 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆27Updated 5 years ago
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.☆41Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆21Updated 6 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- A collection of shellcodes☆67Updated 12 years ago
- LOCAL ROOT EXPLOITS☆37Updated 6 years ago
- Exploit for win10 SMB3.1☆16Updated 4 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 6 years ago
- Format string exploit generation☆9Updated 9 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- ☆24Updated 6 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Updated 12 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Updated 4 months ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- SWF Vulnerability & Information Scanner☆19Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- scripts for generating password wordlists☆8Updated 6 years ago