SlyPI
☆20Jun 13, 2013Updated 12 years ago
Alternatives and similar repositories for Slypi
Users that are interested in Slypi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kali-sly-pi☆36Apr 24, 2019Updated 7 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- Broken web app intentionally built with pentesting obstacles☆16Jun 21, 2019Updated 6 years ago
- ☆50Apr 10, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Nov 15, 2015Updated 10 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆18Apr 12, 2015Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Ivar is an adapter based HTTP client that provides the ability to build composable HTTP requests.☆17Oct 5, 2017Updated 8 years ago
- ☆14Mar 31, 2015Updated 11 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- A Rust library and tools providing easy access to the retdec.com decompilation service through their REST API.☆13Jun 17, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- Converts hashcat .hccap files back to .cap files☆15Mar 20, 2015Updated 11 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Feb 15, 2016Updated 10 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Allowing an anonymous user to log in by only visiting a URL☆32Sep 9, 2017Updated 8 years ago
- Yuri's Linux configuration files☆11Nov 20, 2015Updated 10 years ago
- Collecion of scripts to be run on the pineapple mk7 by Hak5☆28Jun 3, 2023Updated 2 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A web interface for Hashcat/oclHashcat☆30Nov 15, 2016Updated 9 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- A repo on all things pentesting for highly secure environments.☆11Apr 24, 2016Updated 10 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 9 years ago
- Powershell Reverse Rubber Ducky☆57Jun 18, 2015Updated 10 years ago
- A Python command line argument to object parsing library for command line application development☆15Mar 23, 2016Updated 10 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Colour Me Cards are your classic holiday cards, with a modern twist.☆15Dec 24, 2018Updated 7 years ago