Jaqen - Simple DNS rebinding
☆76Mar 15, 2018Updated 8 years ago
Alternatives and similar repositories for jaqen
Users that are interested in jaqen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HackerOne Public Disclosure Slack Bot☆20Sep 19, 2022Updated 3 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Network white noise collector☆19Mar 23, 2016Updated 10 years ago
- A command line tool to detect new unknown device in your network using ARP protocol☆111Feb 4, 2018Updated 8 years ago
- A command based package for simple display of statistics☆25Apr 27, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆141Feb 18, 2021Updated 5 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Dec 9, 2015Updated 10 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Guided Differential Fuzzing for HTTP Request Parsing Discrepancies☆20Apr 11, 2024Updated 2 years ago
- Decrypt MITM SSL RDP and save to pcap☆53May 1, 2014Updated 12 years ago
- ☆231Nov 18, 2015Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Apr 1, 2026Updated last month
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- ☆14Mar 31, 2015Updated 11 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- ☆47Nov 18, 2015Updated 10 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- DNS Rebinding Exploitation Framework☆492Apr 27, 2021Updated 5 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Jan 13, 2018Updated 8 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 12 years ago
- ☆47Sep 3, 2025Updated 8 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆120Apr 26, 2021Updated 5 years ago
- ☆13May 9, 2017Updated 9 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes …☆40Apr 30, 2026Updated last week