Simple IP Information Tools for Reputation Data Analysis
☆23Dec 24, 2018Updated 7 years ago
Alternatives and similar repositories for SIPI
Users that are interested in SIPI are comparing it to the libraries listed below
Sorting:
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 8 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- ☆16May 9, 2016Updated 9 years ago
- ☆14Sep 20, 2014Updated 11 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated last week
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- YARA package for Sublime Text☆19Nov 30, 2025Updated 3 months ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- SnappingTurtle: A cross platform web exploitation tool.☆18Apr 11, 2016Updated 9 years ago
- Rapid7's Nexpose Maltego Transform Pack☆23Aug 11, 2013Updated 12 years ago
- A web spider's worst nightmare.☆54Oct 19, 2012Updated 13 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Jul 1, 2014Updated 11 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Dec 1, 2016Updated 9 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- Check UNIX/Linux systems for privilege escalation☆126Mar 31, 2016Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Security Tool Builder: project to automate the building of hacking tools☆21Mar 7, 2022Updated 3 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- Automatic XSS filter bypass☆90Aug 20, 2015Updated 10 years ago
- Tools for VirusTotal☆36Nov 29, 2012Updated 13 years ago