Simple HTTP listener for security testing
☆20Oct 7, 2022Updated 3 years ago
Alternatives and similar repositories for up-http-tool
Users that are interested in up-http-tool are comparing it to the libraries listed below
Sorting:
- All the deals for InfoSec related software/tools this Black Friday☆16Nov 25, 2023Updated 2 years ago
- privilege escalation by piggy-backing user sudo requests☆11Feb 6, 2023Updated 3 years ago
- CTF toolbox☆21Feb 14, 2021Updated 5 years ago
- Tampermonkey Script - Amazon Giveaways☆15Dec 6, 2018Updated 7 years ago
- A Powerful Intruder written in Python☆21Nov 18, 2021Updated 4 years ago
- Bookmarklet to find endpoints easily with one click☆79May 19, 2024Updated last year
- Testing POC for use cases☆25Nov 24, 2024Updated last year
- Automate installation of extra pentest tools on Kali Linux☆62Apr 18, 2021Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆60Apr 18, 2021Updated 4 years ago
- This tool was created to automatically send 53 different types of USPS branded boxes, with the maximum quantities to any address (about 5…☆30Nov 6, 2020Updated 5 years ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- Stuff about it-security that might be good to know☆24Oct 20, 2019Updated 6 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆55Jan 25, 2022Updated 4 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- Browse the web entirely over SMS — no apps required.☆13Oct 6, 2014Updated 11 years ago
- capNcook - a dark web exploration tool☆88Apr 6, 2024Updated last year
- A couple of different scripts, made to automate attacks against NoSQL databases.☆66Mar 13, 2024Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆17Oct 27, 2019Updated 6 years ago
- Xfinity / Comcast Wordlist Generator☆78Mar 24, 2023Updated 2 years ago
- Apple BLE proximity pairing message spoofing☆23Sep 21, 2023Updated 2 years ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆52Mar 1, 2024Updated 2 years ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆55Feb 7, 2024Updated 2 years ago
- Manual scripts to hack into cars :)☆110Apr 28, 2025Updated 10 months ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆23Oct 19, 2019Updated 6 years ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆63Sep 11, 2023Updated 2 years ago
- A multi-threaded port scanner implementation in Python☆12May 30, 2023Updated 2 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆13Aug 21, 2024Updated last year
- ☆28Oct 18, 2022Updated 3 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- ☆32Sep 19, 2020Updated 5 years ago
- just a little treasure chest of stuff I need to watch / read later☆32Mar 26, 2021Updated 4 years ago
- X-Platform bind shell in TypeScript!☆29Jul 11, 2025Updated 7 months ago
- Autofill Phishing☆86Aug 25, 2025Updated 6 months ago
- ☆95Dec 9, 2022Updated 3 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- ☆14May 14, 2022Updated 3 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- ☆170Jul 27, 2024Updated last year