Anon-Exploiter / decoder
A simple script to try and decode a string in various encoding mechanisms regardless of its (original) type.
☆25Updated 4 years ago
Alternatives and similar repositories for decoder:
Users that are interested in decoder are comparing it to the libraries listed below
- SMTP Open Relay Exploitation☆13Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 4 years ago
- Subdomain Scan (knockpy) in Python3☆11Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Web App Pen Tester (Web Interface)☆31Updated 2 years ago
- Wordlists for intelligent directory brute-forcing☆29Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆17Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- A Simple Web Shell used for Remote Code Execution.☆11Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆11Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- A collection of hacks and one-off scripts☆18Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Rockyou for web fuzzing☆14Updated 3 years ago
- Passive subdomain enumeration tool with http-probe.☆33Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆33Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆11Updated 3 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 3 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- Deepsearch leak database client, as an alternative for pwndb☆15Updated 2 years ago