Exploit Time-Based SQL Injection | Retrieve Database Informations
-
Updated
May 3, 2024 - Python
Exploit Time-Based SQL Injection | Retrieve Database Informations
A reverse shell written in Python
Automate the obfuscation process for C# post-exploitation tools.
Windows RAT w/ antivirus bypass.
keylogger python with send email
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Post-Exploitation Toolkit for Splunk 🐒
Different code samples for Chrome browser analysis & post exploitation
A simple post exploitation tool for unix made for learning purposes
Portable RC4-encrypted Python reverse shell.
This is a malware manipulation environment for OpenAI's gym
Desafio DIO para a produção de um Ransomware
Generate a post exploit script to download an arbitrary file using HTML5's Blob object (https://developer.mozilla.org/en-US/docs/Web/API/Blob)
A post-exploitation script that sniffs for POST req data and covertly sends it back to the attackers server using TCP SYN ISN
Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.
Experiments with using mqtt as a C2 mechanism
Python port scanner and host discovery tool, using only the python standard library
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."