SpiderLabs / oracle_pwd_toolsView external linksLinks
Oracle Database 12c password brute forcer
☆29Jun 18, 2015Updated 10 years ago
Alternatives and similar repositories for oracle_pwd_tools
Users that are interested in oracle_pwd_tools are comparing it to the libraries listed below
Sorting:
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- The ModSecurity Pcap Connector☆27Jan 13, 2016Updated 10 years ago
- ModSecurity status☆33May 27, 2014Updated 11 years ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆16Feb 25, 2025Updated 11 months ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- SpiderLabs shared Nmap Tools☆230Aug 7, 2020Updated 5 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 9 months ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- The NIST Open Access to Research (OAR) Public Data Repository (PDR) system software☆14Jan 4, 2026Updated last month
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆13Jul 31, 2019Updated 6 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48May 1, 2022Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- HoneySAP: SAP Low-interaction research honeypot☆51May 1, 2023Updated 2 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆28Mar 26, 2023Updated 2 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Python version of OWASP's DirBuster Application.☆29Dec 18, 2014Updated 11 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- ☆18Jun 25, 2024Updated last year
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Perform Thread Hijacking Shellcode Injection without OpenProcess and OpenThread mapping all the free handles in memory☆16Jul 16, 2024Updated last year
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago