DedSecInside / ViPER-CLILinks
Command Line Interface of ViPER Pen Testing tool.
☆14Updated 8 years ago
Alternatives and similar repositories for ViPER-CLI
Users that are interested in ViPER-CLI are comparing it to the libraries listed below
Sorting:
- Web App Pen Tester (Web Interface)☆31Updated 2 years ago
- DES Encrypter/Decrypter☆18Updated 8 years ago
- Key Logger with UI☆39Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 10 months ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆29Updated 4 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- pentest toolbox☆28Updated 2 years ago
- Simple (but working) WEP/WPA/WPA2 Hacking script☆30Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- An index which uses 'spiders' to crawl and explore every discoverable hidden service on Tor.☆9Updated 7 years ago
- Collection of cracked malware☆14Updated 6 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆17Updated 6 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- web information gathering / Grab links☆43Updated 5 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 6 months ago