Launch hacking tests in cloud providers securely, isolated and without raise security alerts in the provider
☆16Dec 12, 2017Updated 8 years ago
Alternatives and similar repositories for idsfree
Users that are interested in idsfree are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to exploit imagetragick vulnerability to gain remote code execution☆20Dec 20, 2017Updated 8 years ago
- Fiddler2 Plugin for AMF format parsing☆14May 9, 2016Updated 9 years ago
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- A tool to list plugins installed on a wordpress powered website.☆11Jun 20, 2024Updated last year
- Gichidan - CLI wrapper for Ichidan deep-web search engine.☆32Apr 20, 2018Updated 7 years ago
- eZpublish vulnerability scanner☆10Feb 20, 2020Updated 6 years ago
- 8ball☆17Sep 7, 2023Updated 2 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- ☆10Nov 29, 2018Updated 7 years ago
- Do some quick reconnaissance on a domain-based web-application☆13Jun 1, 2021Updated 4 years ago
- Run commands in a remote system using Telegram chat. This let you control devices without open ports.☆13Aug 15, 2023Updated 2 years ago
- Search exploits in multiple exploit databases!☆12Feb 8, 2016Updated 10 years ago
- Look for a backdoor shell on the website☆14Jul 17, 2018Updated 7 years ago
- termux api usage☆14Apr 24, 2019Updated 6 years ago
- Docker image to build personal website with resume☆11Aug 16, 2022Updated 3 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- Recursively calculates the hash of all files in a given path and checks them against the Virustotal threat database☆14Jun 30, 2023Updated 2 years ago
- SSH with a ADB port forward☆11Dec 17, 2023Updated 2 years ago
- Bypass Google's Santa☆22Apr 13, 2015Updated 10 years ago
- Acherus, The Docker Hold, is a containerized hacking environment gathering many tools and resources☆15Dec 29, 2025Updated 2 months ago
- Share wifi on windows with arranged password like every hour or every day☆14Feb 4, 2017Updated 9 years ago
- Track torrent downloads☆14Dec 9, 2022Updated 3 years ago
- EncFS Encrypted Filesystem☆39Apr 8, 2014Updated 11 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Sep 27, 2016Updated 9 years ago
- Proof of concept exploit for CVE-2017-3599☆23Apr 18, 2017Updated 8 years ago
- Read-only mirror of https://gitlab.gnome.org/GNOME/gcr☆12Feb 27, 2026Updated 3 weeks ago
- ☆13Jan 28, 2017Updated 9 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- A secret agent who spies on what your app's users are doing.☆32Jan 23, 2019Updated 7 years ago
- Change your Ip address☆15Feb 27, 2022Updated 4 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆95Mar 18, 2024Updated 2 years ago
- The AndroidSpyApp is a university project to collect data from user device and send them to firebase database. The collected data are sho…☆20Feb 2, 2021Updated 5 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- Release of the sandy framework.☆39Sep 30, 2014Updated 11 years ago
- A proof of concept for a general batch data transformation DSL☆14Mar 13, 2018Updated 8 years ago
- WAF Testing Tool☆21May 16, 2014Updated 11 years ago
- quality of life☆19Dec 24, 2019Updated 6 years ago