akonkol / spurView external linksLinks
Spur is a web based network configuration manager. It allows you to ssh or telnet to any networked device (cisco routers, linux hosts,etc) and run commands through a web front-end. The results of these commands are stored and can be diff'd. Emails can be sent when there is a diff, if you want.
☆19Aug 7, 2012Updated 13 years ago
Alternatives and similar repositories for spur
Users that are interested in spur are comparing it to the libraries listed below
Sorting:
- Submit commands to devices using ssh/telnet☆23Oct 29, 2015Updated 10 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Tor relay nearest neighbour ranking☆10Oct 18, 2021Updated 4 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- library to decode/parse zeus-like configuration files☆30Mar 19, 2018Updated 7 years ago
- 投诉太狠啊,换个地方自己下吧☆14Jun 13, 2016Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- This project is designed to enumerate back-end hosting Content Management Systems and aid security professionals in detecting vulnerabili…☆17Mar 14, 2017Updated 8 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Mar 5, 2014Updated 11 years ago
- A cms discover recognize tool in python☆19Dec 15, 2015Updated 10 years ago
- Script to find exploitable magic methods for PHP object injection☆27Dec 4, 2014Updated 11 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Aug 3, 2016Updated 9 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- Replacement for pyRouterLib - A library for easily accessing routers and switches via ssh, telnet, and snmp☆22Jan 29, 2026Updated 2 weeks ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Dec 3, 2015Updated 10 years ago
- [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS☆23Nov 17, 2017Updated 8 years ago
- [discontinued] Mass exploiter of CVE-2015-1579 for WordPress CMS☆28May 21, 2018Updated 7 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31May 25, 2016Updated 9 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- RadSSH is a Python utility/toolkit that facilitates multiple concurrent SSH interactive command execution shells, as well as many other p…☆35Dec 3, 2020Updated 5 years ago
- app lock android project☆16May 31, 2013Updated 12 years ago
- Prometheus Firewall Analyzer☆48May 1, 2015Updated 10 years ago
- ☆36Jul 24, 2016Updated 9 years ago
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate rel…☆34Nov 10, 2019Updated 6 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- nuagenetworks open source portal☆10Jun 22, 2024Updated last year
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Nov 24, 2014Updated 11 years ago
- Diameter TCP to SCTP proxy☆13Feb 4, 2012Updated 14 years ago
- The web gui for the OpenBSD pf firewall☆16Feb 9, 2010Updated 16 years ago
- Topology library for Coq☆12Dec 24, 2015Updated 10 years ago