CrustyJew / SnooNotes
☆8Updated last year
Related projects ⓘ
Alternatives and complementary repositories for SnooNotes
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- Proof of concept demo for a tool that listens for keywords, and records audio to a file.☆12Updated 7 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆22Updated 11 years ago
- SIP-Based DDoS Defense Tool☆13Updated 6 years ago
- .Net library to create Maltego transformations.☆17Updated last month
- Various techniques for exploiting Windows☆12Updated last year
- Prototype program to decode a video file looking for exploits/malware.☆16Updated 4 years ago
- This is the linux version of the R.A.T client written in c#☆10Updated 7 years ago
- SilverHeart - Keylogger fully developed in python 3.7.3☆9Updated 7 months ago
- module for certexfil☆15Updated 2 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- https://gallery.technet.microsoft.com/PS2EXE-Convert-PowerShell-9e4e07f1☆13Updated 7 years ago
- Cross-Site Scripting (XSS) scanner. This tool helps to find possible XSS vulnerabilities. Cross platform - macOS, Linux, and Windows.☆12Updated 7 years ago
- Mass decryptor for Eazfuscator.net Symbol Names Encryption☆9Updated 5 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 6 years ago
- ☆7Updated 7 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆11Updated 7 years ago
- SocksSharp provides support for Socks4/4a/5 proxy servers to HttpClient☆11Updated 3 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Install, uninstall and control remote and local windows services☆13Updated 11 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 5 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆10Updated 5 years ago
- Simple web frontend to an elasticsearch database made for local files indexing☆18Updated 5 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Updated 10 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago