NetSPI HTTP Scrapers
☆29Jul 9, 2019Updated 6 years ago
Alternatives and similar repositories for HTTPScrapers
Users that are interested in HTTPScrapers are comparing it to the libraries listed below
Sorting:
- Scraper for collecting companies data from the https://www.zoominfo.com/ website☆15Sep 5, 2020Updated 5 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- External C2 Using IE COM Objects☆100Feb 24, 2019Updated 7 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- ☆25Jul 7, 2022Updated 3 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- ☆36Nov 4, 2017Updated 8 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Tools for attacking Azure Function Apps☆88Oct 28, 2025Updated 4 months ago
- ☆34Jul 23, 2018Updated 7 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- Jira Information Gatherer☆29Dec 3, 2017Updated 8 years ago
- DAFT: Database Audit Framework & Toolkit☆182Aug 11, 2021Updated 4 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- Synaptics Audio Driver LPE☆38Apr 15, 2019Updated 6 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 6 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- Groovy Post Exploitation☆20Oct 21, 2024Updated last year
- Generates anti-sandbox analysis HTA files without payloads☆121Mar 16, 2017Updated 9 years ago
- Chromium Cookie import / export tool☆11Jul 21, 2024Updated last year
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- quASAR: ASAR manipulation made easy☆38Sep 7, 2022Updated 3 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- allowing um r/w through km from um ioctl ™☆11Jan 2, 2022Updated 4 years ago
- SQLC2 is a PowerShell script for deploying and managing a command and control system that uses SQL Server as both the control server and …☆77Nov 5, 2022Updated 3 years ago
- Analyze ARP requests to identify hosts that are communicating with one another.☆19Jun 21, 2019Updated 6 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- ☆28Apr 1, 2018Updated 7 years ago