
Usually they have two main functions: + Secret authentication : Password or RSA key auth for the backdoor user,In the example only password auth implemented….

Badger – The swiss army knife for windows exploit development. Allowing exploit developers to think more about development than the repetitive tasks done everyday. Examples…

In this project, we took advantage of a buffer overflow attack in order to gain access to a vulnerable server. This attack, in brief, involves…

dirs3arch is a simple command line tool designed to brute force directories and files in websites. Operating Systems supported: – Windows XP/7/8 – GNU/Linux –…

Changelog v5-5.rc1: – Some minor fixes on send_packet() function. T50 (f.k.a. F22 Raptor) is a tool designed to perform “Stress Testing”. The concept started on…

Android-MAC-Spoofer is a Spoof the MAC address of your rooted Android device from Windows. Changes are persistent accross reboots. Tool allows backup of the original…

cipherBrute.pl – Bruteforce supported SSL/TLS cipher suites and extract SSL Certificate information.
cipherBrute.pl is a Bruteforce supported SSL/TLS cipher suites and extract useful SSL Certificate information. Note: This tool uses the installed version of OpenSSL on the…

wordbrutepress : WordPress Brute Force Multithreading with standard and xml-rpc login method written in python. Features: 1) Multithreading 2) xml-rpc brute force mode 3) http…