DanMcInerney / FuzzStringsLinks
Simple, hand-picked list of fuzz strings
☆33Updated 8 years ago
Alternatives and similar repositories for FuzzStrings
Users that are interested in FuzzStrings are comparing it to the libraries listed below
Sorting:
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Parses Nmap XML files☆25Updated 10 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Pentesting Tools☆22Updated 3 years ago
- ☆17Updated 10 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 9 years ago
- Quick scan to find live hosts on the network/across networks☆48Updated 11 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- ☆46Updated 7 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 14 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- misc pentest tools.☆26Updated 10 years ago
- Automatically performs the SMB relay attack☆73Updated 9 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Windows Offline Common Password Hash Checker☆29Updated 9 years ago
- ☆63Updated 12 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- ☆25Updated 10 years ago