alguien-gh / scriptsLinks
☆21Updated 8 years ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below
Sorting:
- apk binder script☆60Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- A collection of shellcodes☆70Updated 13 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Distributed wrapper around oclHashcat☆93Updated 10 months ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Some NSE scripts to search information from routers☆36Updated 10 years ago
- XSS payload designed to steal LastPass users' credentials☆16Updated 11 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Firmware Reversing Repo :p☆17Updated 10 years ago
- FUD Metasploit Android Payload☆11Updated 10 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- Build a search engine from nmap XML files☆20Updated 11 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 7 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- Graphical user interface for the windows version of THC Hydra☆55Updated 8 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- new WPS attack tool☆60Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Updated 9 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- Wardriving ekoparty☆15Updated 8 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago