LeonardoNve / dns2proxy_hsts
DNS2Proxy offensive proxy version for HSTS
☆29Updated 7 years ago
Alternatives and similar repositories for dns2proxy_hsts:
Users that are interested in dns2proxy_hsts are comparing it to the libraries listed below
- ☆47Updated 9 years ago
- Metasploit msfvenom Bash Completions Generator☆42Updated 8 years ago
- Automated information gathering tool for pentest☆54Updated 8 years ago
- scripts used in my pentest work.☆44Updated 9 years ago
- ☆34Updated 8 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 4 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Domain fronting using Google app engine☆52Updated 7 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆51Updated 7 years ago
- Metasploit automation. Why work when a minion can do it?☆21Updated 7 years ago
- Burp Suite Attack Selector Plugin☆61Updated 7 years ago
- Custom THP Dropper☆26Updated 7 years ago
- General Scripts to help with various types of SQL Injection☆30Updated 11 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆42Updated 6 years ago
- Brute forcer and shell deployer for WildFly☆99Updated 7 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Updated 6 years ago
- Some works on Nmap Scripts (NSE)☆86Updated 9 months ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆79Updated 7 years ago
- ☆64Updated 7 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆107Updated 6 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 2 years ago
- It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).☆55Updated 3 years ago