achillean / redis-keysLinks
Using Shodan to get a breakdown of the most common key names in public Redis servers.
☆13Updated 7 years ago
Alternatives and similar repositories for redis-keys
Users that are interested in redis-keys are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 14 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Updated 11 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Suite for Information gathering☆12Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- ☆15Updated 8 years ago
- The ModSecurity Pcap Connector☆27Updated 9 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆23Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 11 months ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆34Updated 7 years ago
- ☆20Updated last year
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Updated 7 years ago