OsandaMalith / IPObfuscatorLinks
A simple tool to convert the IP to a DWORD IP
☆139Updated 2 years ago
Alternatives and similar repositories for IPObfuscator
Users that are interested in IPObfuscator are comparing it to the libraries listed below
Sorting:
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- unix wildcard attacks☆134Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 7 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- Pentest Scripts for Apache Vulnerabilities☆31Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- ☆21Updated 8 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆174Updated last year
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- Exploit insecure crossdomain.xml files.☆26Updated 8 years ago
- ☆86Updated 10 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 5 months ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Advanced XPath Injection Tool☆34Updated 10 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 7 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool [Unofficial]☆95Updated 11 years ago
- Brute forcer and shell deployer for WildFly☆99Updated 7 years ago
- Some exploits and exploit development stuff.☆148Updated 3 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆44Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Platform independent peCloak fork based on Capstone☆106Updated 9 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Updated 11 years ago
- PoC for an adaptive parallelised DNS prober☆108Updated 2 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- ☆122Updated 7 years ago