az0mb13 / hookerLinks
☆13Updated 2 years ago
Alternatives and similar repositories for hooker
Users that are interested in hooker are comparing it to the libraries listed below
Sorting:
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 11 months ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- pîrebok (from Kurdish "witch") - a guided adversarial fuzzer☆15Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 7 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆15Updated last year
- Python C2 with JScript Implant☆14Updated last year
- Everything about xss protection technology☆15Updated 5 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Tool for obtaining information about PPL processes☆17Updated last year
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆10Updated 10 months ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated last year
- Simple WebSocket fuzzer☆33Updated 2 years ago
- Magento Security Scanner☆15Updated 3 years ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆22Updated 10 months ago
- ☆17Updated 2 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 3 years ago
- ☆22Updated last year