PowerScript / GetDataReportLinks
Get information client with getdatareport (Plugin)
☆25Updated 8 years ago
Alternatives and similar repositories for GetDataReport
Users that are interested in GetDataReport are comparing it to the libraries listed below
Sorting:
- pwning & info gathering via user browser☆39Updated 10 years ago
- library and intepreter for penetration testing tools☆30Updated 9 years ago
- PHPEB is a small tool that generates and stores obfuscated shellcode in user specified EXIF handlers.☆79Updated 8 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- ~ BannerGrab☆26Updated 8 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆42Updated 3 years ago
- The Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting …☆89Updated 7 years ago
- AutoBrowser Screenshot☆49Updated 8 years ago
- A standalone PHP backdoor for use on *nix and Windows systems.☆50Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆64Updated 9 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆41Updated 3 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆54Updated 4 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- ☆22Updated 8 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 9 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Django Web UI contributed by Yandex for w3af.☆51Updated 10 years ago
- XSSing Your Way to Shell☆32Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Ransack Post Exploitation Tool☆16Updated 9 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Updated 9 years ago