Framework for exploiting local vulnerabilities
☆83Nov 18, 2023Updated 2 years ago
Alternatives and similar repositories for BoomER
Users that are interested in BoomER are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Get clients and access points.☆49Aug 28, 2019Updated 6 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 6 months ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆97Aug 13, 2022Updated 3 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆534Mar 27, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆37Feb 11, 2020Updated 6 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node☆24Jul 24, 2019Updated 6 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆164Aug 21, 2019Updated 6 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Jan 12, 2026Updated 3 months ago
- ☆25May 9, 2021Updated 4 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆273Mar 24, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆31Sep 30, 2019Updated 6 years ago
- Open source all-in-one CLI tool to semi-automate pentesting.☆180May 21, 2020Updated 5 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- ☆94Aug 17, 2020Updated 5 years ago
- HashCobra Hash Cracking tool.☆123Dec 1, 2020Updated 5 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 6 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆83Updated this week
- Simple script for web directory scanning☆33Apr 23, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- NebulousAD automated credential auditing tool.☆154Apr 8, 2020Updated 6 years ago
- Tool to deploy a post-exploitation prompt at any time☆323May 28, 2021Updated 4 years ago
- Automate SSH communication with firewalls, switches, etc.☆28Mar 29, 2018Updated 8 years ago
- Small CTF challenges running on Docker☆158Jul 26, 2018Updated 7 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 4 years ago
- Unofficial API & Client for dnsdumpster.com and hackertarget.com☆67Feb 9, 2019Updated 7 years ago