A project designed to parse public source code repositories and find various types of vulnerabilities.
☆193Oct 6, 2017Updated 8 years ago
Alternatives and similar repositories for RepoSsessed
Users that are interested in RepoSsessed are comparing it to the libraries listed below
Sorting:
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆379Oct 12, 2020Updated 5 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- locate and attack Lync/Skype for Business☆346Oct 1, 2024Updated last year
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- PoC for an adaptive parallelised DNS prober☆109Oct 4, 2022Updated 3 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆104Jun 1, 2018Updated 7 years ago
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- Issues to consider when planning a red team exercise.☆616Aug 23, 2017Updated 8 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- ☆72Nov 20, 2017Updated 8 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Exploits written by the Rhino Security Labs team☆1,095Jan 23, 2021Updated 5 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆60Nov 19, 2017Updated 8 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆760Jan 28, 2019Updated 7 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆488May 23, 2023Updated 2 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Nov 20, 2017Updated 8 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 8 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Burp Extender plugin that generates a sitemap of a website using Wayback Machine☆227May 8, 2018Updated 7 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆36Mar 1, 2020Updated 5 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- ☆91Jul 31, 2019Updated 6 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago