aschmitz / nepenthesLinks
A tool for netpens.
☆38Updated 6 years ago
Alternatives and similar repositories for nepenthes
Users that are interested in nepenthes are comparing it to the libraries listed below
Sorting:
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Configuration security audit framework☆21Updated 9 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- ☆27Updated 8 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- PoC implementation of the POODLE attack☆68Updated 10 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- A scoreboard for Security CTF events☆37Updated 12 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Static and automated/dynamic malware analysis☆47Updated 9 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 12 years ago
- A warehouse for your malware☆133Updated 12 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- POLAR☆73Updated 6 years ago
- ☆74Updated 3 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 9 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 10 years ago
- Exploits, Fuzzers, Scripts etc☆34Updated 4 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago