Popular repositories Loading
-
-
PoC-TeleSniff-Backdoor
PoC-TeleSniff-Backdoor PublicProof of concept written with Python ( and lldb OSX), get Telegram authentification codes,Contact,last location of a locked telegram session and send it to command and control (C&C)
-
CVE-2017-0199
CVE-2017-0199 PublicForked from bhdresh/CVE-2017-0199
Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit / …
Python 2
-
gl-ar150-pineapple-firmware-builder
gl-ar150-pineapple-firmware-builder PublicForked from KhasMek/gl-ar150-pineapple-firmware-builder
Couple of files for pulling the necessary tools and adding configs for porting the WiFi Pineapple firmware to the GLi GL-AR150.
Shell 1
-
MacroJob
MacroJob PublicForked from JohnLaTwC/MacroJob
Proof of concept VBA code to add to Normal.dot to put restrictions on Word
Visual Basic 1
-
Microsploit
Microsploit PublicForked from screetsec/Microsploit
Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer Overflow
Shell 1
If the problem persists, check the GitHub status page or contact support.