LinkedInAttic / jaqenView external linksLinks
Jaqen - Simple DNS rebinding
☆75Mar 15, 2018Updated 7 years ago
Alternatives and similar repositories for jaqen
Users that are interested in jaqen are comparing it to the libraries listed below
Sorting:
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆139Feb 18, 2021Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes …☆40Jan 29, 2026Updated 2 weeks ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Dec 9, 2015Updated 10 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- ☆14Mar 31, 2015Updated 10 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Decrypt MITM SSL RDP and save to pcap☆53May 1, 2014Updated 11 years ago
- ☆11Mar 19, 2019Updated 6 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 2 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Jan 1, 2021Updated 5 years ago
- Get version headers from a list of websites☆12Oct 1, 2020Updated 5 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- ☆47Nov 18, 2015Updated 10 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- ☆232Nov 18, 2015Updated 10 years ago
- ☆47Sep 3, 2025Updated 5 months ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- My OSCP report template in LaTex☆25Jan 31, 2020Updated 6 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 9 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- ☆13May 9, 2017Updated 8 years ago
- 📅 jq for date / time ⏲☆15Feb 26, 2025Updated 11 months ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 11 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- Cowrie Honeypot Obscurer☆17Oct 14, 2020Updated 5 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- A simple Python SSH server that reveals passwords of connecting clients☆32Jul 7, 2017Updated 8 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- ☆13Dec 8, 2022Updated 3 years ago