Oracle Database 12c password brute forcer
☆29Jun 18, 2015Updated 10 years ago
Alternatives and similar repositories for oracle_pwd_tools
Users that are interested in oracle_pwd_tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- A new approach to randomness testing☆12Nov 27, 2016Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Jan 29, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆10Dec 29, 2016Updated 9 years ago
- Sample OGNL expressions for attribute mapping and issuance criteria☆12Mar 21, 2024Updated 2 years ago
- Simple REST-style web service for the CVE searching☆97May 19, 2023Updated 2 years ago
- ModSecurity status☆33May 27, 2014Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Apr 16, 2015Updated 10 years ago
- The ModSecurity Pcap Connector☆27Jan 13, 2016Updated 10 years ago
- SpiderLabs shared Nmap Tools☆231Aug 7, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆49May 1, 2022Updated 3 years ago
- Create a self-signed x-509 certificate with the Web Cryptography API and PKIjs☆23Mar 7, 2015Updated 11 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- Windows Automatic Root Update History☆34Sep 8, 2025Updated 6 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- HoneySAP: SAP Low-interaction research honeypot☆50May 1, 2023Updated 2 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆32Dec 7, 2010Updated 15 years ago
- The IDES Data Preparation .NET project repository demonstrates a sample working application developed using .NET Framework.☆32Sep 30, 2018Updated 7 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- s(4)u for Windows☆48Dec 8, 2020Updated 5 years ago
- Updated version of the 2010 KoreLogic password cracking rules for John the Ripper☆63Sep 27, 2012Updated 13 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- ☆47Nov 18, 2015Updated 10 years ago
- ☆163Aug 28, 2015Updated 10 years ago
- ☆20Jul 25, 2019Updated 6 years ago