Pr0x13 / CVE-2014-4377
☆13Updated 10 years ago
Alternatives and similar repositories for CVE-2014-4377:
Users that are interested in CVE-2014-4377 are comparing it to the libraries listed below
- ☆12Updated 10 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- All tools you needed during penetration testing.☆17Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- various exploits☆31Updated 12 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆12Updated 9 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- Network white noise collector☆18Updated 9 years ago
- Tools for use with phishing frenzy☆11Updated 6 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 8 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 7 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Service desk password tools.☆15Updated 7 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago