D3vil0p3r / catana
CATANA - CUT your Wordlist!
☆14Updated 2 years ago
Alternatives and similar repositories for catana
Users that are interested in catana are comparing it to the libraries listed below
Sorting:
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- Classic Web shell upload techniques & Web RCE techniques☆30Updated 6 months ago
- Bash script to generate reverse shell payloads☆19Updated last year
- A fast wordlist to nthash converter☆21Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Command line client for HackTheBox☆22Updated last year
- ☆29Updated 2 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Updated 3 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- Pull Hashes Decryption From Online Sources Using Python☆16Updated 10 months ago
- ☆17Updated 2 weeks ago
- ☆26Updated 2 years ago
- ☆16Updated 5 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆43Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- ☆27Updated 2 years ago
- ☆28Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month