Scripts and other goodies from the pwnieexpress project ported
☆10Mar 16, 2014Updated 11 years ago
Alternatives and similar repositories for pwnieexpress
Users that are interested in pwnieexpress are comparing it to the libraries listed below
Sorting:
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- ☆10Jan 26, 2016Updated 10 years ago
- The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with 50+ secur…☆32Feb 25, 2026Updated last week
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Network Keylogger is an open source program that sends every key pressed in a computer to another computer, via TCP/IP. It can be used to…☆41Apr 25, 2011Updated 14 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Jan 25, 2021Updated 5 years ago
- Get information client with getdatareport (Plugin)☆25Oct 18, 2016Updated 9 years ago
- nanoBoot - 512 byte USB HID Bootloader for ATmega16U4/ATmega32U4☆28Feb 16, 2022Updated 4 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- SIM Card Forensic Acquisition using USB to Serial readers☆38Sep 17, 2014Updated 11 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Ingest Nessus files into Elasticsearch using PowerShell!☆17Nov 14, 2025Updated 3 months ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69May 7, 2016Updated 9 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- Scan/Exploit Blueborne CVE-2017-0785☆31Feb 28, 2018Updated 8 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 8 months ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- MipScope is a cross-platform IDE for students learning assembly on the MIPS architecture. The focus is on a convenient debugging environm…☆17May 11, 2024Updated last year
- Bitcoin Hardware Wallet Interaction scripts☆11Jan 30, 2026Updated last month
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- Verilog bit slicing for python☆10May 13, 2021Updated 4 years ago
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year
- ☆10Oct 8, 2015Updated 10 years ago
- Anrodi Trojanı Başka Bir Programla Birleştir☆10Oct 30, 2016Updated 9 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- ☆15Oct 27, 2015Updated 10 years ago
- Burp Scanner XML Parser☆36Sep 24, 2014Updated 11 years ago
- Simple demo ilustrating the use of LSTM neural network to predict daily changes in the Ethereum cryptocurrency☆10Jan 23, 2018Updated 8 years ago