Keramas / BlowholeView external linksLinks
Docker auditing and enumeration script.
☆22Oct 7, 2019Updated 6 years ago
Alternatives and similar repositories for Blowhole
Users that are interested in Blowhole are comparing it to the libraries listed below
Sorting:
- Fournir des ressources actionables de sécurité pour les services biomédicaux.☆11Mar 15, 2020Updated 5 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Feb 9, 2019Updated 7 years ago
- Hugo repository for main ironpeak.be website.☆12Oct 14, 2025Updated 4 months ago
- Simple tmux session management.☆16Dec 16, 2023Updated 2 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- ☆36Oct 1, 2024Updated last year
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- ☆16May 6, 2015Updated 10 years ago
- A Wireshark dissector for Bluetooth Low Energy (BLE) advertisement packets of Apple Continuity, Microsoft CDP and Garmin proprietary prot…☆17Mar 13, 2020Updated 5 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Kubernetes Scanner☆40Feb 14, 2022Updated 4 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- A tool to evaluate Content Security Policies.☆71Jun 20, 2020Updated 5 years ago
- Collection of some personal markdown resources☆21Jan 31, 2019Updated 7 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- The WooKey project manifest repository, use repo init -u https://github.com/wookey-project/manifest.git☆17May 28, 2021Updated 4 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- A library and cli tool to extract HWP files.☆30Dec 1, 2025Updated 2 months ago
- melter library for Win32 PE files☆18Jul 6, 2015Updated 10 years ago
- ☆23Apr 11, 2024Updated last year
- 📡 A security research tool with shodan integration☆25Sep 6, 2018Updated 7 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Jul 22, 2017Updated 8 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- pentest toolbox☆27Jul 24, 2022Updated 3 years ago
- The documents☆56Nov 2, 2017Updated 8 years ago
- ☆49Jul 25, 2017Updated 8 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- ☆24Feb 12, 2016Updated 10 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Run commands on linux through those pesky firewalls☆29Jul 21, 2015Updated 10 years ago
- Perl script to test the reliability of a list of open web proxies.☆31Jul 5, 2017Updated 8 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- ☆94Dec 15, 2025Updated 2 months ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Dec 21, 2015Updated 10 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago