A tool to generate media files with malicious metadata
☆129Feb 2, 2019Updated 7 years ago
Alternatives and similar repositories for Metadata-Attacker
Users that are interested in Metadata-Attacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆120Apr 26, 2021Updated 4 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 6 months ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated last month
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Utility script to test zip file upload functionality (and possible extraction of zip files) for vulnerabilities (aka Zip Slip)☆31May 31, 2019Updated 6 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- ☆14Mar 31, 2018Updated 7 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- ☆32May 30, 2019Updated 6 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆449May 25, 2022Updated 3 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Apr 16, 2019Updated 6 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Jan 30, 2017Updated 9 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago