D3vil0p3r / catanaLinks
CATANA - CUT your Wordlist!
☆15Updated 3 years ago
Alternatives and similar repositories for catana
Users that are interested in catana are comparing it to the libraries listed below
Sorting:
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆36Updated 4 years ago
- ☆37Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Interactive navi redteam cheats☆33Updated 5 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 11 months ago
- ☆27Updated 2 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆40Updated last month
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Updated 2 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- List of fresh and validated DNS resolvers updated every 12h.☆24Updated this week
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Python Penetration Testing Tools☆17Updated 5 months ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆17Updated 9 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago