☆28Oct 12, 2012Updated 13 years ago
Alternatives and similar repositories for PXEClient
Users that are interested in PXEClient are comparing it to the libraries listed below
Sorting:
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- A tool to find security vulnerabilities in Xamarin.Android apps.☆12Mar 28, 2022Updated 3 years ago
- ☆25Sep 17, 2025Updated 5 months ago
- Python 3 SimpleHTTPServer over HTTPS TLS with Basic Auth☆11Apr 9, 2018Updated 7 years ago
- A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive…☆13Jul 4, 2024Updated last year
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Nov 30, 2016Updated 9 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- Lutech TMS EHAT-NG☆13Jul 8, 2017Updated 8 years ago
- ☆19Aug 3, 2023Updated 2 years ago
- ☆23Mar 11, 2014Updated 11 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆13Jun 25, 2020Updated 5 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- BMC Bladelogic RSCD exploits including remote code execution - CVE-2016-1542, CVE-2016-1543, CVE-2016-5063☆20Apr 17, 2020Updated 5 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- ☆21May 14, 2017Updated 8 years ago
- ELF/PE/Mach-O parsing library☆26Oct 10, 2024Updated last year
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Mar 31, 2017Updated 8 years ago
- Broadcom CFE NAND dumper (uses `dn` command) - kinda crappy, use with care☆32Sep 8, 2023Updated 2 years ago
- vSphere Security Audit Scripts, Based on the vSphere Hardening Guide.☆26Feb 23, 2021Updated 5 years ago
- Scripts to prepare Windows system for debugging.☆31Jan 5, 2021Updated 5 years ago
- ESXi Cyber Security Incident Response Script☆25Sep 4, 2024Updated last year
- My fuzzing workshop from PHDays9☆26May 24, 2019Updated 6 years ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 8 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- Inspect MQTT over TLS traffic with ease!☆49Jan 23, 2025Updated last year
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆51Jun 6, 2023Updated 2 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Apr 23, 2020Updated 5 years ago
- Memory dump tools for backing up the flash chip using the bootloader via UART port. Only valid for specific bootloaders.☆42Oct 31, 2023Updated 2 years ago
- Tools for ESP32 firmware dissection☆61Jan 20, 2026Updated last month
- ☆57Aug 7, 2020Updated 5 years ago