A web spider's worst nightmare.
☆54Oct 19, 2012Updated 13 years ago
Alternatives and similar repositories for TarPyt
Users that are interested in TarPyt are comparing it to the libraries listed below
Sorting:
- IPV6 MITM attack tool☆92Aug 7, 2013Updated 12 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- ID-spoofing NFS client☆299Dec 3, 2019Updated 6 years ago
- RESTful interface to your operating system shell☆19Nov 8, 2017Updated 8 years ago
- An Ansible Playbook to fully prepare a machine for Kubernetes development☆10Oct 10, 2024Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- Tools to decode, decrypt, analyze cipher and hopefully can be a cryptography learning tool.☆41Jul 4, 2015Updated 10 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/scapy-guide☆13Jun 15, 2015Updated 10 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Dec 24, 2018Updated 7 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- ☆11Jan 22, 2020Updated 6 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- Wrappers around smbclient and winexe with PTH support☆33Feb 23, 2016Updated 10 years ago
- Collection of IronPython scripts and executables for penetration testing☆57Feb 26, 2019Updated 7 years ago
- collection of evil code☆14Feb 20, 2013Updated 13 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 3 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 10 years ago
- The Credential Mapper☆451Dec 1, 2017Updated 8 years ago
- ☆19Jun 8, 2021Updated 4 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆33Mar 4, 2016Updated 10 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Reverse transparent protocol agnostic socks proxy.☆17Jan 14, 2020Updated 6 years ago
- Enrich a host with open source security information☆27Oct 4, 2015Updated 10 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Mar 5, 2014Updated 12 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago