MrSharkSpamBot / GlidingSwordLinks
A wacky exploitation framework written in pure python3.
☆25Updated last year
Alternatives and similar repositories for GlidingSword
Users that are interested in GlidingSword are comparing it to the libraries listed below
Sorting:
- Small python script to look for common vulnerabilities on SMTP server.☆48Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- web application pentesting tools for docker☆18Updated 3 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- A powerful reverse shell generator☆44Updated 3 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆16Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆51Updated 7 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- An exotic service bruteforce tool.☆14Updated 4 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆21Updated 11 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- A tool for steganography of png files .☆24Updated 3 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 6 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 11 months ago