0xKira / pedaView external linksLinks
PEDA - Python Exploit Development Assistance for GDB
☆23Aug 6, 2025Updated 6 months ago
Alternatives and similar repositories for peda
Users that are interested in peda are comparing it to the libraries listed below
Sorting:
- GDB for pwn☆11Sep 10, 2025Updated 5 months ago
- ☆14Sep 26, 2021Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated last year
- Smart Content Management System using Spring Boot☆17Jan 28, 2026Updated 2 weeks ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- SubDomain Finder☆13Nov 9, 2021Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Dec 8, 2025Updated 2 months ago
- ☆12Sep 22, 2022Updated 3 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆22Aug 6, 2024Updated last year
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- ssshh its a secret ;)☆21Mar 7, 2022Updated 3 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Dec 20, 2025Updated last month
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 5 years ago
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆26Jan 4, 2022Updated 4 years ago
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆19Updated this week
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python …☆24Aug 29, 2021Updated 4 years ago
- ☆25Mar 21, 2020Updated 5 years ago
- A proof-of-concept Node.js ransomware☆21Mar 27, 2022Updated 3 years ago
- Wi-Fi Exploit Tool☆51May 23, 2020Updated 5 years ago
- Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️☆26Jul 22, 2022Updated 3 years ago
- ADDS (Active Directory Domain Services)☆28Feb 3, 2026Updated last week