Stars
request new identity every X seconds interval using TOR client
Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which captures HTTP requests towards selectively chosen domains/IP…
A simple library to recover the private key of ECDSA and DSA signatures sharing the same nonce k and therefore having identical signature parameter r
SSHPry v2 - Spy & Control os SSH Connected client's TTY
Automatic acquisition of TG channel proxy information
Cobalt Strike team server password brute force tool
This repository presents a proof-of-concept of CVE-2023-7028
Bypass android application SSL-pinning
扫描常见未授权访问(redis、mongodb、memcached、elasticsearch、zookeeper、ftp、CouchDB、docker、Hadoop)
WeblogicScanLot系列,Weblogic漏洞批量检测工具,V2.2
Find the host network card address through OXID Resolver
out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability
Python Data Science and Machine Learning Library for the Ethereum and ERC-20 Blockchain
CVE-2021-36798: CobaltStrike < 4.4 Dos