Download files out of open AWS buckets
☆38Dec 12, 2018Updated 7 years ago
Alternatives and similar repositories for tadpole
Users that are interested in tadpole are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆33Mar 7, 2021Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Advanced Hash Manipulation☆176Oct 14, 2019Updated 6 years ago
- A simple XSS finding tool☆111Nov 9, 2018Updated 7 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆12Jul 24, 2025Updated 8 months ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AnDroidInject0r is a Python script to inject existing Android applications with a Meterpreter payload. It can be used during penetrating …☆17Feb 22, 2021Updated 5 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆180Jan 29, 2019Updated 7 years ago
- Deep Learning AI Bots that trade the forex market☆13Jul 14, 2018Updated 7 years ago
- Massive scanner to detect exposed .env files across multiple targets.☆13Jan 10, 2026Updated 2 months ago
- crash poc & Leak info PoC☆17Mar 19, 2018Updated 8 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- ☆19Jun 8, 2021Updated 4 years ago
- A high frequency trading bot that takes advantage of arbitrage opportunities in forex markets using the Bellman-Ford algorithm.☆19Dec 6, 2021Updated 4 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 11 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- Advanced reconnaissance utility☆995Nov 20, 2023Updated 2 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated last month
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- A PoC for CVE-2018-7249☆15Apr 29, 2025Updated 11 months ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆11Dec 20, 2015Updated 10 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- macOS Privilege Escalation Helper☆144Feb 17, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Content from THOTCON 0xa talk☆10May 5, 2019Updated 6 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- Rust on the Quansheng UV-K5 Radio☆10Jul 9, 2024Updated last year
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- Machine assisted dossiers☆19Oct 12, 2017Updated 8 years ago