Python version of OWASP's DirBuster Application.
☆29Dec 18, 2014Updated 11 years ago
Alternatives and similar repositories for Dir-Xcan
Users that are interested in Dir-Xcan are comparing it to the libraries listed below
Sorting:
- EternalBlue/DoublePulsar python wrapper☆10Nov 22, 2017Updated 8 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Credentials recovery project☆11May 12, 2015Updated 10 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- push☆24Apr 21, 2016Updated 9 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Jun 9, 2021Updated 4 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- Search Nmap and Metasploit scanning scripts.☆54Sep 18, 2017Updated 8 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- Simple python script to scan some weak things.☆14Nov 2, 2015Updated 10 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- OptionsBleed (CVE-2017-9798) PoC / Scanner☆18May 21, 2024Updated last year
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Sep 12, 2017Updated 8 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Apr 12, 2015Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Software for nRF BLE Sniffer☆23Mar 9, 2017Updated 9 years ago
- Download exploits from exploit-db.com☆47Jun 26, 2015Updated 10 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- 用于还原svn仓库,支持1.6,1.7☆26Jun 3, 2016Updated 9 years ago
- st2-046-poc CVE-2017-5638☆21Aug 17, 2018Updated 7 years ago
- ☆22Jul 6, 2022Updated 3 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Brute forcer and shell deployer for WildFly☆99Mar 10, 2018Updated 7 years ago
- 绕过burp破解版的截止日期限制. This is a tool to bypass the cracked version of the burpsuite_pro(Larry_Lau) certification deadline through time revers…☆23May 27, 2022Updated 3 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Sep 20, 2014Updated 11 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago