MichaelDim02 / colloide
Colloide is a bruteforcing tool to find hidden pages, files and directories inside websites
☆33Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for colloide
- MCD's Black Jack is a password cracking tool for linux that cracks md5, sha1, sha256 and sha512 hashes. It uses the Dictionary bruteforci…☆19Updated 4 years ago
- A python tool that will extract exif data from picture with two methods☆37Updated 2 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 3 years ago
- web information gathering / Grab links☆41Updated 5 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆28Updated 4 years ago
- ☆9Updated 8 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 4 months ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- scripts to setup pentesting system and use during pentest☆18Updated 2 years ago
- w3af packaging for Kali distribution☆26Updated 8 years ago
- Fake AccessPoint Attack☆29Updated 6 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 6 years ago
- List of Security Archives Tools and software, generally for facilitate security & penetration research. Opening it up to everyone will fa…☆47Updated 7 years ago
- A standalone addon for GnuPG☆18Updated 5 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆28Updated 8 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- ☆12Updated 10 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Random scripts I write to automate non-hacking stuff☆21Updated 5 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆13Updated 6 years ago
- ☆13Updated 7 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 7 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆51Updated 6 years ago