Smart Install Client Scanner
☆60Jan 31, 2020Updated 6 years ago
Alternatives and similar repositories for smi_check
Users that are interested in smi_check are comparing it to the libraries listed below
Sorting:
- Smart Install Exploitation Tool☆594Dec 21, 2021Updated 4 years ago
- Alerts you of people who allegedly assaulted others as you browse FetLife. Sister tools exist for Facebook (https://apps.facebook.com/pre…☆20Aug 29, 2016Updated 9 years ago
- A BurpSuite extension for lair☆28Oct 18, 2017Updated 8 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Jun 30, 2018Updated 7 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Convert ARIN Whois bulk data to computer parsable routing data☆10Jan 2, 2018Updated 8 years ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- ☆16Feb 28, 2026Updated last week
- The GitHub Action for Microsoft Application Inspector☆17Jul 10, 2025Updated 7 months ago
- ☆14Jan 19, 2022Updated 4 years ago
- ☆15Jun 28, 2021Updated 4 years ago
- [42-b3yond-6ug] This repository hosts BugBuster, our team’s submission to the AI Cyber Challenge Final Competition.☆31Aug 19, 2025Updated 6 months ago
- Getting Envisioncollision to actually work.☆15Oct 19, 2017Updated 8 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- IOT Trash Can Solution☆19Mar 5, 2023Updated 3 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 4 months ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- A list of XMPP servers available as hidden services for use with the Prosody server and mod_onions☆18Oct 2, 2019Updated 6 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆19Apr 9, 2018Updated 7 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Jan 14, 2019Updated 7 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- A more full featured C# API for connecting to and managing Active Directory (AD) and Lightweight Directory (AD-LDS) instances, complete w…☆25Sep 8, 2015Updated 10 years ago
- Collection of sample scripts for interacting with Cisco Stealthwatch Enterprise APIs.☆19May 23, 2023Updated 2 years ago
- Talos Decryptor POC for Remcos RAT version 2.0.5 and earlier☆24Aug 2, 2018Updated 7 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Nov 15, 2015Updated 10 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 10 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- Develop Burp extensions in Jython☆180Oct 20, 2016Updated 9 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆46Jan 25, 2016Updated 10 years ago