DedSecInside / ViPER-CLILinks
Command Line Interface of ViPER Pen Testing tool.
☆14Updated 8 years ago
Alternatives and similar repositories for ViPER-CLI
Users that are interested in ViPER-CLI are comparing it to the libraries listed below
Sorting:
- Web App Pen Tester (Web Interface)☆31Updated 2 years ago
- DES Encrypter/Decrypter☆18Updated 8 years ago
- Collection of cracked malware☆14Updated 6 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆17Updated 6 years ago
- Key Logger with UI☆39Updated 9 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Anubis Malware Samples☆19Updated 3 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- Trying to take the dum-dum out of security☆11Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- My public exploit collection.☆31Updated 6 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago
- Cryptocurrencies related Security resources☆14Updated 2 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 6 months ago
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 6 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 11 months ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago