breakthenet / Tools-and-TechniquesLinks
A repository of knowledge accumulated that may help in the other BTN challenge repos
☆13Updated 9 years ago
Alternatives and similar repositories for Tools-and-Techniques
Users that are interested in Tools-and-Techniques are comparing it to the libraries listed below
Sorting:
- Hack your friend's online MMORPG game - specific focus, csrf/xss attacks☆91Updated 9 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆99Updated 8 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- The Hacker's ToolBox☆188Updated 8 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- Just a copy-paste XSS test file☆23Updated 12 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- SQL injection vulnerabilities in Stack Overflow PHP questions☆172Updated 8 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Updated 6 years ago
- Universal MITM web server☆108Updated 8 years ago
- Brandis: End-to-end encryption for everyone☆79Updated 8 years ago
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆134Updated 8 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- A webshell framework for penetration testers.☆299Updated 3 weeks ago
- A password cracker for Portable PHP password hashes☆66Updated 5 years ago
- Pen test your "friend's" online MMORPG game - specific focus, sql injection opportunities☆418Updated 9 years ago
- Python Script Obfuscator☆10Updated 10 years ago
- Security tool to detect dns poisoning attacks☆49Updated 10 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- This class can be used to retrieve remote Web pages using the TOR network. It can connect to an HTTP proxy server that accesses the TOR …☆53Updated 13 years ago
- Seamlessly spy on SSH session like it is your tty☆349Updated 7 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆141Updated 7 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆85Updated 7 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 10 years ago
- Raspberry Pi projects☆16Updated 8 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- A Simple ARP Spoofer using Scapy☆104Updated 10 years ago