OsandaMalith / IPObfuscatorLinks
A simple tool to convert the IP to a DWORD IP
☆140Updated 3 years ago
Alternatives and similar repositories for IPObfuscator
Users that are interested in IPObfuscator are comparing it to the libraries listed below
Sorting:
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50Updated 7 years ago
- Pentest Scripts for Apache Vulnerabilities☆30Updated 7 years ago
- Various tools for managing bug bounty recon and exploration.☆49Updated 2 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- ☆22Updated 8 years ago
- Some exploits and exploit development stuff.☆150Updated 3 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated 11 months ago
- Notes/Tools for pentesting☆79Updated last year
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- ☆122Updated 7 years ago
- Brute forcer and shell deployer for WildFly☆101Updated 7 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆94Updated 4 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Updated 8 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆49Updated 4 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Updated 6 years ago
- cve-2018-10933 libssh authentication bypass☆109Updated 7 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Splunk Web Shell☆51Updated 10 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆124Updated 7 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 11 years ago
- Some scripts and exploits☆148Updated 7 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Updated 8 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Updated 8 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆124Updated 7 years ago