0x90 / vpn-arsenal
VPN pentest tools and scripts
☆121Updated 7 years ago
Alternatives and similar repositories for vpn-arsenal:
Users that are interested in vpn-arsenal are comparing it to the libraries listed below
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- WIreless Hacking Tools☆162Updated 11 years ago
- scripts for pentesting☆88Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆75Updated 6 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆75Updated 10 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆288Updated 3 months ago
- Tool made to automate tasks of pentesting.☆166Updated 5 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 4 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Local File Inclusion Exploitation Tool (mirror)☆123Updated 8 years ago
- For all your network pentesting needs☆152Updated 7 months ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- A web application for generating custom XSS payloads☆77Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆82Updated 6 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated last year
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆61Updated 5 years ago
- Pillage a git repo found in an accessible web root☆60Updated 13 years ago
- Examine HTTP response headers for common security issues☆39Updated 2 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 6 years ago
- Search drives for documents containing passwords☆63Updated 10 years ago
- Phishing Template Generation Made Easy☆165Updated 7 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 11 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆96Updated 6 years ago
- Just a collection of pentest stuffs☆95Updated 5 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago