andresriancho / w3af-kaliLinks
w3af packaging for Kali distribution
☆26Updated 9 years ago
Alternatives and similar repositories for w3af-kali
Users that are interested in w3af-kali are comparing it to the libraries listed below
Sorting:
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 4 years ago
- My metasploit modules☆11Updated 10 years ago
- CTF Writeups☆18Updated 7 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 8 years ago
- A web app scanner☆26Updated 11 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 7 months ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago