Multi source CVE/exploit parser.
☆27Aug 30, 2017Updated 8 years ago
Alternatives and similar repositories for PyParser-CVE
Users that are interested in PyParser-CVE are comparing it to the libraries listed below
Sorting:
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- .Net library to create Maltego transformations.☆17Feb 11, 2025Updated last year
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Feb 12, 2019Updated 7 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆248Nov 11, 2020Updated 5 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Oct 13, 2015Updated 10 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- Shodan.io Command Line Interface☆43Jul 10, 2021Updated 4 years ago
- Automated PowerShell installer for *Nix with multi Distro support.☆20Nov 21, 2018Updated 7 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- A SIEM inspired by HECTOR, built on Django.☆27Apr 16, 2019Updated 6 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- BitPing A Simple Bitcoin Address Changer From Clipboard☆11Jun 28, 2018Updated 7 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆13Jan 3, 2018Updated 8 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- a very basic proxy obfuscator based on dnlib☆21Jul 3, 2018Updated 7 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- Note:- Run this Script in root user.☆16Oct 13, 2017Updated 8 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- ☆24Jul 6, 2018Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Port scanning and domain utility.☆30Sep 8, 2017Updated 8 years ago