JLospinoso / unfurlView external linksLinks
An Entropy-Based Link Vulnerability Tool
☆60Feb 8, 2018Updated 8 years ago
Alternatives and similar repositories for unfurl
Users that are interested in unfurl are comparing it to the libraries listed below
Sorting:
- A fast Web API scraper written in C++ and built on Boost ASIO☆43Apr 1, 2020Updated 5 years ago
- ☆276Oct 19, 2021Updated 4 years ago
- DNSProb is a tool built on top of retryabledns that allows you to perform multiple dns queries of your choice with a list of user supplie…☆282Dec 21, 2020Updated 5 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- A script to enumerate virtual hosts on a server.☆691Dec 28, 2017Updated 8 years ago
- UUID issues for Burp Suite☆53Jun 2, 2022Updated 3 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- ☆625Feb 1, 2024Updated 2 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Jul 8, 2019Updated 6 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- unix wildcard attacks☆137May 25, 2018Updated 7 years ago
- A simple script to screenshot a list of websites☆681Oct 19, 2025Updated 3 months ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- PNG IDAT chunks ~ payload generator☆15Jun 14, 2016Updated 9 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- ☆16May 6, 2015Updated 10 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Mar 12, 2018Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- ☆16Jun 23, 2024Updated last year
- Generates several metasploit payloads☆15Apr 13, 2018Updated 7 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- ☆26Dec 8, 2025Updated 2 months ago
- ☆41Jul 4, 2018Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- My blog where I make a new coding project every Thursday.☆46Dec 2, 2025Updated 2 months ago
- Scripts that we use for pentesting☆42Feb 24, 2017Updated 8 years ago
- Subdomain Takeover tool written in Go☆2,026Aug 13, 2023Updated 2 years ago
- ☆1,252Dec 17, 2024Updated last year
- ☆29Oct 17, 2018Updated 7 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago