ShadowHatesYou / whori.shView external linksLinks
Zone transfers for rwhois
☆20Feb 27, 2019Updated 6 years ago
Alternatives and similar repositories for whori.sh
Users that are interested in whori.sh are comparing it to the libraries listed below
Sorting:
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- RTSPServer Code Execution Vulnerability CVE-2018-4013☆15Nov 26, 2018Updated 7 years ago
- ☆10Feb 5, 2026Updated last week
- The Alternative Fileless File System☆57Apr 4, 2019Updated 6 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- Nodejs application intentionally vulnerable to SSRF☆42May 12, 2023Updated 2 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Nov 30, 2018Updated 7 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 4 years ago
- ☆14Mar 19, 2024Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- The Outlook HTML Leak Test Project☆131May 12, 2018Updated 7 years ago
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆44Feb 3, 2026Updated last week
- Parser for Sdba memory pool tags☆21Jul 16, 2021Updated 4 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- A tool that can take a URL or list of URL and prints back SAML consume URL.☆36Feb 4, 2019Updated 7 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- [DEPRECATED] Security posture assessment tool for graph databases.☆21Jan 22, 2025Updated last year
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆20Jul 29, 2018Updated 7 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Metasploit reverse TCP stager fully undetectable☆18Nov 29, 2015Updated 10 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- Tools for playing with Entrust IdentityGuard soft tokens, such as decrypting QR codes and deriving OTP secrets☆48Jan 13, 2023Updated 3 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Jun 6, 2024Updated last year
- Repo for proof of concept exploits and tools.☆56Oct 15, 2020Updated 5 years ago
- A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords…☆21Oct 28, 2019Updated 6 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- Fix acquired .evt - Windows Event Log files (Forensics)☆18Mar 29, 2016Updated 9 years ago