aschmitz / nepenthes
A tool for netpens.
☆36Updated 5 years ago
Alternatives and similar repositories for nepenthes:
Users that are interested in nepenthes are comparing it to the libraries listed below
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 10 months ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- ☆27Updated 7 years ago
- Python object interface to requests/responses recorded by Burp Suite☆36Updated 5 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- post-exploitation tools☆15Updated 6 years ago
- ☆57Updated 10 years ago
- A warehouse for your malware☆134Updated 11 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- Search pastebin for keywords using python☆33Updated 13 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆40Updated 2 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Easy Window domain access☆51Updated 10 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago