Betawolf / social-vuln-scannerView external linksLinks
Gathers public information on companies to highlight social engineering risk.
☆30May 25, 2016Updated 9 years ago
Alternatives and similar repositories for social-vuln-scanner
Users that are interested in social-vuln-scanner are comparing it to the libraries listed below
Sorting:
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Jul 9, 2012Updated 13 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 5 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- general framework for creating robots, worms, and backdoors☆11Nov 13, 2017Updated 8 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 9 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- Mirror of https://github.com/iSECPartners/ios-ssl-kill-switch/☆16Dec 28, 2015Updated 10 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro ho…☆15Feb 19, 2016Updated 9 years ago
- Upload external IP so you can find your devices elsewhere☆16Mar 25, 2024Updated last year
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- ☆13Jul 24, 2022Updated 3 years ago
- Systemd service to reset (ifdown & ifup) all wireless interfaces on boot. Greatly improves reliability of wifi adapters on the BeagleBon…☆16Aug 25, 2017Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 9 years ago
- This is a basic Python script that accepts a website's url in string format to initiate a DDoS attack. For educational purposes only.☆14Jan 3, 2015Updated 11 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Apr 22, 2018Updated 7 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 5 years ago
- Bluetooth device and service discovery tool that can be used for security assessment and penetration testing☆16Dec 15, 2015Updated 10 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Social Engineering Toys☆37Feb 1, 2016Updated 10 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- MASS CVE-2021-41773☆29Nov 14, 2023Updated 2 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 5 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- A python server tool based on flask , this tool can phish some Facebook credentials!☆17Jun 22, 2019Updated 6 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- Twerp is the telephone hackers toolkit. It's also a command-line app for Twilio, written in Python☆27Nov 9, 2020Updated 5 years ago
- Source code for Modbus/TCP fuzzer used for ETFA 2015 paper☆21Feb 6, 2025Updated last year
- A series of Bro Scripts created for detection purposes.☆19Nov 18, 2016Updated 9 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Jun 27, 2019Updated 6 years ago
- CVE-2019-7238 Nexus RCE漏洞图形化一键检测工具。CVE-2019-7238 Nexus RCE Vul POC Tool.☆25Jan 15, 2020Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Nov 27, 2016Updated 9 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago