D35m0nd142 / KadabraView external linksLinks
[DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.
☆36Oct 7, 2019Updated 6 years ago
Alternatives and similar repositories for Kadabra
Users that are interested in Kadabra are comparing it to the libraries listed below
Sorting:
- Local File Inclusion Exploitation Tool (mirror)☆128Feb 13, 2017Updated 9 years ago
- ☆23Mar 11, 2014Updated 11 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Scripts for pentesting/hacking☆18Jan 22, 2022Updated 4 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆559Aug 17, 2020Updated 5 years ago
- Simple Zeroconf/mDNS scanner written in Go with no external dependencies☆12Apr 20, 2021Updated 4 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Record X11 keypress events to a log file☆27Mar 19, 2018Updated 7 years ago
- ☆16May 9, 2016Updated 9 years ago
- Hasherdotid☆10Jul 10, 2018Updated 7 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Aug 9, 2020Updated 5 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Search exploits in multiple exploit databases!☆12Feb 8, 2016Updated 10 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Linux information gathering and infrastructure scanner☆14Apr 12, 2019Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- ☆34Feb 26, 2015Updated 10 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 6 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- The description is about to install WishFish tool in Android Termux. WishFish is very easy to hack webcam of your victims mobile.☆15Aug 4, 2020Updated 5 years ago
- EternalRomance&Eternalchampion&Eternalblue☆10May 1, 2017Updated 8 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- ☆17Oct 17, 2018Updated 7 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- This project is just a dumping ground for random scripts I've developed.☆139Aug 14, 2024Updated last year
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago