☆28Oct 12, 2012Updated 13 years ago
Alternatives and similar repositories for PXEClient
Users that are interested in PXEClient are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- ☆25Sep 17, 2025Updated 6 months ago
- [deprecated] see README☆42May 15, 2020Updated 5 years ago
- A tool to find security vulnerabilities in Xamarin.Android apps.☆12Mar 28, 2022Updated 4 years ago
- ☆23Mar 11, 2014Updated 12 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Python 3 SimpleHTTPServer over HTTPS TLS with Basic Auth☆11Apr 9, 2018Updated 8 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive…☆13Jul 4, 2024Updated last year
- Not another SCA. Lists of interesting regular expressions for searching code for security issues. Think FuzzDB for SCA.☆15Nov 30, 2016Updated 9 years ago
- Lutech TMS EHAT-NG☆13Jul 8, 2017Updated 8 years ago
- POC exploit code for CVE-2020-1048(PrintDemon)☆13Jun 25, 2020Updated 5 years ago
- Attempt zone transfers on domains☆18Jul 12, 2021Updated 4 years ago
- ELF/PE/Mach-O parsing library☆26Oct 10, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- BMC Bladelogic RSCD exploits including remote code execution - CVE-2016-1542, CVE-2016-1543, CVE-2016-5063☆20Apr 17, 2020Updated 5 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆21Mar 31, 2017Updated 9 years ago
- Scripts to prepare Windows system for debugging.☆31Jan 5, 2021Updated 5 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Feb 24, 2026Updated last month
- ☆21May 14, 2017Updated 8 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- Scripts for Bro IDS and ELK Stack☆57Sep 2, 2015Updated 10 years ago
- Simple development DNS server written in python☆26Dec 19, 2017Updated 8 years ago
- Broadcom CFE NAND dumper (uses `dn` command) - kinda crappy, use with care☆33Sep 8, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆81Apr 11, 2017Updated 8 years ago
- Bleichenbachers "Million message attack" on RSA in Python☆30Apr 5, 2021Updated 5 years ago
- ☆30Aug 8, 2015Updated 10 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36May 21, 2018Updated 7 years ago
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- A search engine for content shared publicly via cloud storage services☆103Jun 17, 2024Updated last year
- PoC tool to demonstrate vulnerabilities in wireless input devices☆87Mar 24, 2017Updated 9 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- BLE Passkey Bruteforce PoC☆35Sep 13, 2025Updated 6 months ago
- ☆86Mar 29, 2018Updated 8 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 9 years ago
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated last year
- Script for searching the extracted firmware file system for goodies!☆31Jul 17, 2019Updated 6 years ago
- HARDSPLOIT GUI : The essential security auditing tool for Internet of Things devices you'll need in your toolbox☆39Apr 23, 2020Updated 5 years ago