Ice3man543 / hawkeyeLinks
Hawkeye filesystem analysis tool
☆236Updated 6 years ago
Alternatives and similar repositories for hawkeye
Users that are interested in hawkeye are comparing it to the libraries listed below
Sorting:
- an asynchronous target enumeration tool☆244Updated 2 years ago
- a CLI for ephemeral penetration testing☆13Updated 5 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 6 years ago
- Some scripts and exploits☆146Updated 7 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆178Updated 5 years ago
- Github for the scripts utilised during Penetration test☆235Updated 8 years ago
- blacksheepwall is a hostname reconnaissance tool☆303Updated 5 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆257Updated last month
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆151Updated 5 years ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆88Updated 3 months ago
- An XSS reverse shell framework☆309Updated 6 years ago
- Go-deliver is a payload delivery tool coded in Go.☆115Updated 7 years ago
- Search Exploitable Software on Linux☆230Updated 2 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- The Guppy Proxy (GUI Pappy)☆143Updated 6 years ago
- [ceased maintenance] An open source alternative to burp suite written in Go.☆156Updated 6 years ago
- A Go implementation of dirsearch.☆279Updated 3 years ago
- CVE-2018-10933 very simple POC☆128Updated 6 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆180Updated 3 years ago
- ☆206Updated 4 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆238Updated 2 years ago
- An exploit for Apache Struts CVE-2017-9805☆250Updated 7 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆104Updated 3 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- Common password pattern generator using strings list☆132Updated 4 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆170Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago