CriticalSecurity / welock
☆27Updated 3 years ago
Alternatives and similar repositories for welock:
Users that are interested in welock are comparing it to the libraries listed below
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- ☆22Updated 9 months ago
- Fast dns resolver☆13Updated 11 months ago
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- Linksys Smart Wi-fi X-JNAP-Action Sensitive Information Disclosure for EA8500 router and potentially others☆19Updated 3 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- CVE-2020-5902☆9Updated 4 years ago
- 🗺 Convert nmap XML output to beautiful JSON☆16Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- A wrapper around jq, to help you parse jq output!☆30Updated 4 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆10Updated last year
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Updated 4 years ago
- ☆10Updated 7 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- HTTP discovery and change monitoring tool☆12Updated 2 months ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Reports issued by Enable Security☆10Updated 2 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Install and upgrade projectdiscovery tools☆10Updated 2 years ago