☆129Jul 17, 2015Updated 10 years ago
Alternatives and similar repositories for bearded
Users that are interested in bearded are comparing it to the libraries listed below
Sorting:
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- SHIFT后门,适用于windows xp\2003 server\2008 server☆17May 4, 2014Updated 11 years ago
- A lightweight batch scanning framework based on gevent.☆48Jun 22, 2018Updated 7 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- Eagle is a Web Application Attack and Audit Framework. Eagle has moved to Bitbucket.☆11Nov 21, 2016Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Wooyun查询系统☆108Sep 26, 2015Updated 10 years ago
- ☆212Apr 17, 2017Updated 8 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Exploiting Edge's read:// urlhandler☆15Oct 23, 2021Updated 4 years ago
- A domain/ip fuzzing tool for vulnerability mining☆100Mar 13, 2015Updated 11 years ago
- 自己使用的一些脚本,大概和乌云(wooyun)有关☆24Jun 15, 2022Updated 3 years ago
- Script to run wvs in queue, and send mails to you on ending.☆82Oct 8, 2015Updated 10 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Sep 6, 2014Updated 11 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- 投诉太狠啊,换个地方自己下吧☆14Jun 13, 2016Updated 9 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- ☆16Apr 16, 2015Updated 10 years ago
- ☆91Feb 22, 2021Updated 5 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆459Mar 2, 2021Updated 5 years ago
- Web-based Source Code Vulnerability Scanner☆353Oct 8, 2017Updated 8 years ago
- Honeypot deployment made easy☆237Mar 13, 2019Updated 7 years ago
- High-interaction MitM SSH honeypot☆173May 13, 2018Updated 7 years ago
- .NET WPF Framework☆20Mar 9, 2017Updated 9 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Apr 19, 2017Updated 8 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Add headers to all Burp requests to bypass some WAF products☆330Jan 28, 2018Updated 8 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Jun 25, 2024Updated last year
- PHP Frontend to work with the SQLMAP JSON API Server (sqlmapapi.py) to allow for a Web GUI to drive near full functionality of SQLMAP!☆325Aug 31, 2015Updated 10 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- Metasploit AV Evasion Tool☆256Dec 22, 2015Updated 10 years ago
- A tool that checks and downloads scripts that will aid with privilege escalation on a Windows system.☆171Apr 25, 2016Updated 9 years ago
- A Burp Extender plugin, that will make binary soap objects readable and modifiable.☆29Feb 21, 2022Updated 4 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆147May 10, 2016Updated 9 years ago
- Creates a SOCK proxy server that transmits data over an SSRF vulnerability☆114Aug 8, 2012Updated 13 years ago