File/Web Text Scraper and Wordlist Generator
☆40Oct 1, 2020Updated 5 years ago
Alternatives and similar repositories for SmeegeScrape
Users that are interested in SmeegeScrape are comparing it to the libraries listed below
Sorting:
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- ☆19May 18, 2021Updated 4 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- 网上收集的一些利用工具☆18May 23, 2023Updated 2 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- Linux Runtime Process Injection Tool☆61Feb 21, 2013Updated 13 years ago
- Sensors for the datacenter to protect against intruders and high temperatures☆18Sep 13, 2016Updated 9 years ago
- Burp Suite Importer - Connect to multiple web servers while populating the sitemap.☆47May 15, 2020Updated 5 years ago
- Deliberately vulnerable web application☆22Jun 18, 2017Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Mar 21, 2023Updated 2 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 12 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- Geospatial analysis and simulation using Twitter data☆22May 20, 2018Updated 7 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Nov 4, 2014Updated 11 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Jan 11, 2023Updated 3 years ago
- A better version of the command-line android tool with a more intuitive command-line interface.☆34Apr 16, 2020Updated 5 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- A demo of altering an opened tab after a timer☆123Jun 11, 2016Updated 9 years ago
- You'll never take me alive.☆85May 9, 2014Updated 11 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Quick script to set up VPN server and reverse VPN for Nethunter☆38Aug 22, 2016Updated 9 years ago
- A memory allocator that aims to eliminate dangling pointer vulnerabilities at a low overhead, using virtualisation via Dune. My Computer …☆10Nov 27, 2019Updated 6 years ago
- ☆11Jan 18, 2020Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 10 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Adding client SOCKS support to Twisted.☆18Feb 2, 2014Updated 12 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- • The first blockchain records both the consensus protocol and transaction data on chain. • Built multi fiat-based stable coins, e.g. EUR…☆12Nov 14, 2018Updated 7 years ago
- Project that was done as part of the OOP course during my second year in college.☆11Oct 18, 2015Updated 10 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago