3vangel1st / kamerkaLinks
Build interactive map of cameras from Shodan
☆23Updated 5 years ago
Alternatives and similar repositories for kamerka
Users that are interested in kamerka are comparing it to the libraries listed below
Sorting:
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Another Subdomain ENumeration Tool☆12Updated 3 years ago
- A tool written in python for scraping firebase data☆43Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆55Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- A python library to automate time-based blind SQL injection☆49Updated 6 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 5 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- Hacked together script for feeding urls into Burp's Sitemap☆93Updated 6 months ago
- services-names-wordlist☆83Updated 11 months ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 5 years ago
- Various scripts and codes☆85Updated 4 years ago
- Offensive Security recon tool☆92Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- REST API backend for Reconmap☆47Updated last week
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆131Updated 2 months ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆90Updated 5 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆71Updated 2 years ago
- Unicode encoding attacks with machine learning☆97Updated 3 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Updated 6 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15Updated 5 years ago