Port scanning and domain utility.
☆29Sep 8, 2017Updated 8 years ago
Alternatives and similar repositories for QuickScan
Users that are interested in QuickScan are comparing it to the libraries listed below
Sorting:
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago
- Shodan.io Command Line Interface☆43Jul 10, 2021Updated 4 years ago
- Share wifi on windows with arranged password like every hour or every day☆14Feb 4, 2017Updated 9 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- 🕷️MITMProxy + Ettercap = PWNd☆11Dec 5, 2018Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Utility to generate a TLS Certificate.☆17Apr 11, 2020Updated 5 years ago
- Tools and scripts for firmware reverse engeneering☆48Sep 18, 2020Updated 5 years ago
- A SSH honeypot written in Go☆13Dec 12, 2013Updated 12 years ago
- Gateway between SMTP/POP3 and TOX protocol.☆13Feb 10, 2018Updated 8 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- c programming☆10Oct 31, 2020Updated 5 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- stuff from my ToorCon 2015 talk☆14Oct 27, 2015Updated 10 years ago
- ROP based Movfuscator VM☆28Nov 3, 2016Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year or…☆19Jun 20, 2021Updated 4 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- ☆54Feb 27, 2017Updated 9 years ago
- VPN pentest tools and scripts☆126Jun 18, 2017Updated 8 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 6 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Oct 27, 2019Updated 6 years ago
- Scrape real-time Dark Web data across Tor to your local kafka network☆14Mar 10, 2016Updated 9 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago