FLUXION
☆22Oct 3, 2016Updated 9 years ago
Alternatives and similar repositories for fluxion
Users that are interested in fluxion are comparing it to the libraries listed below
Sorting:
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- ☆22May 20, 2016Updated 9 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- MySite☆26Jan 17, 2023Updated 3 years ago
- Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flun…☆28Jan 15, 2017Updated 9 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- ☆25Oct 6, 2016Updated 9 years ago
- A tool for recover router password☆33Jun 19, 2018Updated 7 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Dec 3, 2020Updated 5 years ago
- Visualizing historical data of Mark Six, a lottery game organised by the Hong Kong Jockey Club, using Streamlit☆11Jan 16, 2026Updated last month
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Various Wireless Driver patches☆34Apr 24, 2019Updated 6 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago
- Helper scripts to assist penetration testing and exploit development☆35Dec 11, 2024Updated last year
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project☆13Nov 30, 2020Updated 5 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- UCTRONICS release high speed lcd35 with spi interface for Raspberrypi☆10Oct 9, 2021Updated 4 years ago
- ☆38Apr 24, 2019Updated 6 years ago
- ☆15Sep 4, 2024Updated last year
- Linux pentest tools☆89Nov 4, 2019Updated 6 years ago
- Golang实现的x86下的Meterpreter reverse tcp☆39Feb 23, 2020Updated 6 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago