Exploit Time-Based SQL Injection | Retrieve Database Informations
-
Updated
May 3, 2024 - Python
Exploit Time-Based SQL Injection | Retrieve Database Informations
A reverse shell written in Python
Automate the obfuscation process for C# post-exploitation tools.
Windows RAT w/ antivirus bypass.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Post-Exploitation Toolkit for Splunk 🐒
keylogger python with send email
Desafio DIO para a produção de um Ransomware
A simple post exploitation tool for unix made for learning purposes
This is a malware manipulation environment for OpenAI's gym
Portable RC4-encrypted Python reverse shell.
Generate a post exploit script to download an arbitrary file using HTML5's Blob object (https://developer.mozilla.org/en-US/docs/Web/API/Blob)
A post-exploitation script that sniffs for POST req data and covertly sends it back to the attackers server using TCP SYN ISN
Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.
Experiments with using mqtt as a C2 mechanism
Python port scanner and host discovery tool, using only the python standard library
A simple python module that implements a packet sniffer and analyser. It sniffs and analyses TCP, UDP, IPV4 and IPV6 traffic.
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."