Specify targets and run sets of tools against them
☆11Apr 19, 2015Updated 10 years ago
Alternatives and similar repositories for autopwn
Users that are interested in autopwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆41Sep 6, 2015Updated 10 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Broken web app intentionally built with pentesting obstacles☆16Jun 21, 2019Updated 6 years ago
- Automated pshtt, trustymail, and sslyze scanning☆30Mar 26, 2026Updated 3 weeks ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Generate HTTPS reports based on scan data☆15Updated this week
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 9 years ago
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆11Aug 27, 2022Updated 3 years ago
- Generate AWS Lambda environment zip files for use by cisagov/domain-scan☆12Oct 11, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- gtfobin checker☆11Oct 25, 2020Updated 5 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Mar 26, 2021Updated 5 years ago
- ☆12Apr 14, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- mirror of☆11Apr 4, 2018Updated 8 years ago
- Dr. Jekyll's Themes - Static Website Theme Directory☆15Aug 27, 2023Updated 2 years ago
- ☆15Aug 31, 2020Updated 5 years ago
- Official Black Hat Arsenal Security Tools Repository☆12Aug 3, 2017Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Apr 3, 2015Updated 11 years ago
- Single-threaded epoll-based concurrent bulk whois client☆31Oct 31, 2017Updated 8 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆87Dec 27, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago
- ☆18Mar 28, 2015Updated 11 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 5 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- A set of simple tools every developer needs, collected in one application.☆15May 9, 2019Updated 6 years ago