BuffaloWill / gumblerLinks
Dig through Git commits and logs
☆21Updated 7 years ago
Alternatives and similar repositories for gumbler
Users that are interested in gumbler are comparing it to the libraries listed below
Sorting:
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- ☆12Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Updated 10 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 8 years ago
- A scoreboard for Security CTF events☆37Updated 13 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- Comprehensive Pivoting Framework☆20Updated 9 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32Updated 13 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- Phishing e-mail repository☆36Updated 5 years ago
- ☆61Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Material from our CANAPE workshop☆32Updated 7 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- Puny Domain Name Check☆37Updated 6 years ago