KyxRecon / Proxy-Tools
☆12Updated 10 years ago
Alternatives and similar repositories for Proxy-Tools:
Users that are interested in Proxy-Tools are comparing it to the libraries listed below
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Go command line app to exploit file upload vulnerability☆12Updated 8 years ago
- A web app scanner☆26Updated 11 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆17Updated 11 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Updated 7 years ago
- Try various exploits to get root☆19Updated 11 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- port scanner & login credential tester☆16Updated 6 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- For BurpSuite Plugins☆11Updated 9 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- My metasploit modules☆11Updated 9 years ago
- All tools you needed during penetration testing.☆17Updated 8 years ago
- ☆47Updated 9 years ago
- Search bing with python☆12Updated 10 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago