A mass subdomain (Subbrute) + poodle vulnerability scanner
☆75Oct 31, 2018Updated 7 years ago
Alternatives and similar repositories for spoodle
Users that are interested in spoodle are comparing it to the libraries listed below
Sorting:
- Create custom Windows batch files from a configuration file☆32Oct 29, 2016Updated 9 years ago
- Hackerone disclosed report URL Aggregator☆30Oct 31, 2018Updated 7 years ago
- LD_PRELOAD rootkit☆24Oct 12, 2014Updated 11 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Rootkit☆24Nov 15, 2014Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Jun 11, 2018Updated 7 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- Web Application Security☆130Jan 6, 2026Updated 2 months ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- A linux rootkit works on kernel 4.0.X or higher☆37Jun 21, 2016Updated 9 years ago
- VOIP Security Audit Framework☆109Jan 22, 2018Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- HackerOne Public Disclosure Slack Bot☆20Sep 19, 2022Updated 3 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Dec 2, 2016Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Windows PE file debugger☆11Aug 30, 2017Updated 8 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Mar 5, 2014Updated 12 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Mar 20, 2015Updated 10 years ago
- A Unix rootkit☆17Aug 9, 2020Updated 5 years ago
- ☆28Oct 30, 2016Updated 9 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆159May 1, 2024Updated last year
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Utility tool to help digitally sign applications (binaries) on Windows.☆13Jun 8, 2015Updated 10 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Framework patches for OpenPDroid permission management☆39Mar 8, 2014Updated 11 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- Get the IP adresses of Bittorrent Peers☆13Oct 14, 2016Updated 9 years ago
- analyze the content of the pe file on windows, and shell(pack) function for windows drivers.☆11Nov 9, 2018Updated 7 years ago
- autoscan - automatic fingerprint of visited networks☆11Nov 2, 2013Updated 12 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago