0x6d616d616e206272696769747465 / Nemesis
☆19Updated 7 years ago
Alternatives and similar repositories for Nemesis:
Users that are interested in Nemesis are comparing it to the libraries listed below
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Automatically exported from code.google.com/p/checkout4mac☆13Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- A tool to triage screenshots☆19Updated 7 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Collection of information security policies.☆29Updated 7 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- distributed www CMS spyder☆8Updated 7 years ago
- USB key cleaner☆60Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- API public documentation☆9Updated 6 years ago
- A scalable framework for binary analysis in a containered environment.☆13Updated 5 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Updated 11 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Updated 9 years ago
- Python Remote Administration Tool☆13Updated 8 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Usefull snippets / Computer-security oriented☆21Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- ☆15Updated 8 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- New and Improved☆17Updated 8 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 8 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- NMAP Patches and NSE Scripts☆19Updated 11 years ago