arikin / crimeflareLinks
Import Crimeflare data into DB tables
☆13Updated 6 years ago
Alternatives and similar repositories for crimeflare
Users that are interested in crimeflare are comparing it to the libraries listed below
Sorting:
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- A collection of nmap scripts I've written☆23Updated 9 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 4 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Automatically exported from code.google.com/p/surfjack - not actively maintained☆9Updated 10 years ago
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆35Updated 6 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- ☆13Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago