M507 / Quick-and-Dirty-ReconView external linksLinks
Quick and dirty reconnaissance hacks for BB and pentesting
☆11Feb 20, 2023Updated 2 years ago
Alternatives and similar repositories for Quick-and-Dirty-Recon
Users that are interested in Quick-and-Dirty-Recon are comparing it to the libraries listed below
Sorting:
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481☆16Apr 19, 2024Updated last year
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 2 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 5 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆26Oct 2, 2021Updated 4 years ago
- Offline Security Client☆12Updated this week
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- 基于Frida的脱壳工具☆12Mar 8, 2021Updated 4 years ago
- 🔥一款Android端基于注解的0反射的持久化存储封装☆12Jan 20, 2022Updated 4 years ago
- Xposed模块项目模板☆15Nov 12, 2025Updated 3 months ago
- ☆11Jul 11, 2023Updated 2 years ago
- Template to detect some malware☆13Aug 7, 2023Updated 2 years ago
- Application Security Mind Maps☆10Apr 10, 2021Updated 4 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- 明星框架: 使用Titanium进行敏捷移动app 的开发。☆12Feb 9, 2016Updated 10 years ago
- 不记得那里找到的工程。 dex2c☆15Aug 20, 2022Updated 3 years ago
- 图灵Python免费体验课,白嫖特供☆10Jul 10, 2023Updated 2 years ago
- ☆11Dec 7, 2025Updated 2 months ago
- ebhttps是首款基于eBPF革命性技术的开源web应用防火墙,最大的优点是零配置、不需要导入SSL证书、不中断生产环境等。☆12Jun 6, 2025Updated 8 months ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated last month
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Zero-day vulnerabilities affecting Microsoft Exchange Server☆12Oct 4, 2022Updated 3 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Frida depends on Vala☆11Jun 29, 2025Updated 7 months ago
- ☆15May 30, 2025Updated 8 months ago
- 安卓逆向相关的一些二进制工具 / Some bin utils for android reverse engineer☆13Apr 28, 2020Updated 5 years ago
- Get Windows Process List in Rust☆10May 4, 2022Updated 3 years ago
- ☆12Jul 14, 2018Updated 7 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- Exploits weaknesses in RC4 to mount a chosen-plaintext attack and recover the private key. The vulnerability is similar to the one used t…☆12Nov 22, 2022Updated 3 years ago
- ☆11Mar 17, 2022Updated 3 years ago