Ekultek / soapyLinks
log file scrubber
☆16Updated 6 years ago
Alternatives and similar repositories for soapy
Users that are interested in soapy are comparing it to the libraries listed below
Sorting:
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Self contained htaccess shells and attacks☆14Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆147Updated 4 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago