DanMcInerney / device-pharmerView external linksLinks
Opens 1K+ IPs or Shodan search results and attempts to login
☆148Jan 30, 2021Updated 5 years ago
Alternatives and similar repositories for device-pharmer
Users that are interested in device-pharmer are comparing it to the libraries listed below
Sorting:
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Feb 18, 2015Updated 10 years ago
- ☆19Apr 29, 2015Updated 10 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 13 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 6 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 6 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Feb 26, 2018Updated 7 years ago
- Search google for shellshock vulnerable sites☆27Oct 10, 2014Updated 11 years ago
- Prints the IPs on your local network that're sending the most packets☆152Jul 20, 2021Updated 4 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- Does some google dorks against a domain☆165Jan 20, 2020Updated 6 years ago
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Scrape google search results☆94Aug 24, 2018Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 10 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆87Mar 27, 2019Updated 6 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Multithreaded SQL union bruteforcer☆16Sep 9, 2011Updated 14 years ago
- Crypt and decrypt the cisco enable 7 passwords☆13Jan 24, 2022Updated 4 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Apr 13, 2017Updated 8 years ago
- Finds public elite anonymity proxies and concurrently tests them☆251Nov 23, 2016Updated 9 years ago
- Multi theaded DNS bruteforcing☆13May 7, 2014Updated 11 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Release of the sandy framework.☆39Sep 30, 2014Updated 11 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago