zphw / dns-cache-poisoning-demoLinks
An isolated environment for DNS cache poisoning attack investigation and demonstration.
☆10Updated 5 years ago
Alternatives and similar repositories for dns-cache-poisoning-demo
Users that are interested in dns-cache-poisoning-demo are comparing it to the libraries listed below
Sorting:
- scylla.sh db dumps and more☆139Updated last month
- A command line tool to search AttackerKB.☆53Updated 4 years ago
- ☆13Updated 3 years ago
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆228Updated 3 years ago
- Proof of Concept for CVE-2019-18634☆230Updated 4 years ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆258Updated last year
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- A spiky Australian bug hunter☆29Updated 5 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 5 years ago
- Basic C2 Server☆193Updated 4 years ago
- Warning! This repository contains samples of ransomware.☆94Updated 3 years ago
- XS-Leak Browser Test Suite☆87Updated 2 years ago
- Challenges for the TheManyHatsClub CTF☆11Updated 2 years ago
- A detailed compilation of polyglots [techniques, tools and resources] for offensive and defensive security (malware, incident response, s…☆114Updated 4 years ago
- Tool for scan vulnerabilities in Moodle platforms☆93Updated 3 years ago
- CAPTCHA22 is a toolset for building, and training, CAPTCHA cracking models using neural networks.☆335Updated 4 years ago
- Artifacts for the Black Hat talk.☆104Updated 5 years ago
- API client for crt.sh☆40Updated 4 years ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆52Updated 13 years ago
- ICMP Reverse Shell written in Python 3 and with Scapy (backdoor/rev shell)☆402Updated last year
- Shadow Workers is a free and open source C2 and proxy designed for penetration testers to help in the exploitation of XSS and malicious S…☆240Updated 2 years ago
- macOS persistence tool☆229Updated 3 years ago
- IPFuscator - A tool to automatically generate alternative IP representations☆400Updated last year
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Updated 3 years ago
- Run several volatility plugins at the same time☆117Updated 3 years ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆88Updated 4 years ago
- Inject a JS file into a PDF file.☆375Updated 6 years ago
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆229Updated 3 years ago
- Showcase of DNS Exfiltration and Infiltration☆55Updated 4 years ago