Port scanning and domain utility.
☆30Sep 8, 2017Updated 8 years ago
Alternatives and similar repositories for QuickScan
Users that are interested in QuickScan are comparing it to the libraries listed below
Sorting:
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- Shodan.io Command Line Interface☆43Jul 10, 2021Updated 4 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- Share wifi on windows with arranged password like every hour or every day☆14Feb 4, 2017Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆41Sep 6, 2015Updated 10 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Gateway between SMTP/POP3 and TOX protocol.☆13Feb 10, 2018Updated 8 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Tools and scripts for firmware reverse engeneering☆48Sep 18, 2020Updated 5 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- ROP based Movfuscator VM☆28Nov 3, 2016Updated 9 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- c programming☆10Oct 31, 2020Updated 5 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Oct 13, 2015Updated 10 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- SkyRAT - Powershell Remote Administration Tool☆34Jan 8, 2018Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- ☆53Feb 27, 2017Updated 9 years ago
- Malicious DLL Generator in Py3☆27Jul 8, 2020Updated 5 years ago
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- Easily connect to a VPN in a country of your choice☆14Jan 22, 2017Updated 9 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- crash poc & Leak info PoC☆18Mar 19, 2018Updated 8 years ago
- A SSH honeypot written in Go☆13Dec 12, 2013Updated 12 years ago
- ☆28Feb 11, 2016Updated 10 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Sniff and decode NRF24L01+ and Bluetooth Low Energy using RTL-SDR☆26Feb 3, 2017Updated 9 years ago