benjholla / bomodView external linksLinks
A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627
☆11Feb 11, 2017Updated 9 years ago
Alternatives and similar repositories for bomod
Users that are interested in bomod are comparing it to the libraries listed below
Sorting:
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated last month
- ☆12Nov 29, 2024Updated last year
- AFOS Package Manager☆10May 2, 2021Updated 4 years ago
- YesMan☆16Nov 8, 2023Updated 2 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- Bare-bones base CentOS image for Docker☆35Jun 25, 2014Updated 11 years ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- All combinations of various characters, to get the desired word☆18Dec 13, 2023Updated 2 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month
- ☆16Jun 21, 2024Updated last year
- ☆13Apr 23, 2018Updated 7 years ago
- ☆15Updated this week
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 6 months ago
- 6.033:Computer Systems Engineering in MIT☆10May 7, 2013Updated 12 years ago
- (abandoned) modular front-end for bittorrent + webtorrent instances☆12Jul 18, 2016Updated 9 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Brute Force attack with Python in Kali Linux☆14Mar 6, 2022Updated 3 years ago
- 🎭Pool MKR tokens to auction voting power to the highest bidder.☆12Aug 14, 2022Updated 3 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- ☆18Jun 25, 2024Updated last year
- ☆24Sep 21, 2024Updated last year
- A python script to generate custom wordlists using GPT☆14Dec 3, 2023Updated 2 years ago
- This repository contains tips, tricks, and examples of aggressor script functions. The intent is to share bite size examples that can be …☆16Aug 12, 2025Updated 6 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Example Code for Fundamentals of ML for Software Engineers☆16Dec 18, 2024Updated last year
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- ☆35Dec 4, 2025Updated 2 months ago
- ☆28Apr 14, 2025Updated 9 months ago
- Configurable, Community driven, HTTP C2 Profile☆27May 30, 2025Updated 8 months ago
- SmartSeed☆10Nov 4, 2018Updated 7 years ago
- ☆12May 9, 2023Updated 2 years ago
- CVE-2023-2640 CVE-2023-32629☆13Aug 15, 2023Updated 2 years ago
- Lightweight coding agent that runs in your terminal with any Model☆13Apr 17, 2025Updated 9 months ago
- ☆15Jun 4, 2025Updated 8 months ago