Introbackdoors
☆50Mar 17, 2017Updated 9 years ago
Alternatives and similar repositories for Introtobackdoors
Users that are interested in Introtobackdoors are comparing it to the libraries listed below
Sorting:
- Sniffs sensitive data from interface or pcap☆16Mar 10, 2015Updated 11 years ago
- Transfer Kippo data to ElasticSearch☆18Dec 14, 2015Updated 10 years ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 2 months ago
- ☆12Dec 16, 2016Updated 9 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- Unofficial Kali Documentation Project☆160Feb 27, 2015Updated 11 years ago
- Attack Knowledge Base☆101Jul 5, 2017Updated 8 years ago
- Decompile .Net code in Powershell☆13Sep 21, 2015Updated 10 years ago
- Challenge files which are deployed in the container for the user☆25May 24, 2024Updated last year
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Oct 21, 2014Updated 11 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- hashkill password recovery tool☆11Feb 4, 2014Updated 12 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 6 months ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆40Feb 23, 2016Updated 10 years ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Square inch Arduino board.☆17Aug 8, 2012Updated 13 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- ☆86Aug 11, 2023Updated 2 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated 2 months ago
- ☆80Sep 27, 2015Updated 10 years ago
- Client/server scripts designed to test outbound (egress) firewall rules.☆37Sep 9, 2013Updated 12 years ago
- Lansweeper Password Recovery Tool☆11Jul 2, 2016Updated 9 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Script to check Kali Linux configs☆25Jan 14, 2019Updated 7 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- python library for dumping a linux process from memory☆34Jun 15, 2010Updated 15 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago
- ☆21Apr 15, 2016Updated 9 years ago
- CVE-2021-26084 - Confluence Pre-Auth RCE | OGNL injection☆21Sep 1, 2021Updated 4 years ago
- A scanner of the "World's Scariest" scanner☆17Dec 7, 2022Updated 3 years ago
- A 10Gbps UDP Reverse Proxy for Realtime Processing☆10Oct 29, 2013Updated 12 years ago
- Advanced XPath Injection Tool☆33Jan 29, 2026Updated last month
- Security tools to use on assessments.☆40May 9, 2016Updated 9 years ago