SlyPI
☆20Jun 13, 2013Updated 12 years ago
Alternatives and similar repositories for Slypi
Users that are interested in Slypi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- Awesome BLE Hack repository☆13Apr 7, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Broken web app intentionally built with pentesting obstacles☆16Jun 21, 2019Updated 6 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆18Apr 12, 2015Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Ivar is an adapter based HTTP client that provides the ability to build composable HTTP requests.☆17Oct 5, 2017Updated 8 years ago
- ☆14Mar 31, 2015Updated 11 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆12Dec 19, 2016Updated 9 years ago
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Converts hashcat .hccap files back to .cap files☆15Mar 20, 2015Updated 11 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Feb 15, 2016Updated 10 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Mar 2, 2018Updated 8 years ago
- ☆20Jun 25, 2015Updated 10 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Yuri's Linux configuration files☆11Nov 20, 2015Updated 10 years ago
- Collecion of scripts to be run on the pineapple mk7 by Hak5☆28Jun 3, 2023Updated 2 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- HackerOne Public Disclosure Slack Bot☆20Sep 19, 2022Updated 3 years ago
- A web interface for Hashcat/oclHashcat☆30Nov 15, 2016Updated 9 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- A repo on all things pentesting for highly secure environments.☆11Apr 24, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Powershell Reverse Rubber Ducky☆57Jun 18, 2015Updated 10 years ago
- A Python client library for the open-source bitcoin exchange Peatio☆14Jan 7, 2017Updated 9 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Apr 15, 2025Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Feb 26, 2021Updated 5 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 9 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago