breakthenet / Tools-and-TechniquesLinks
A repository of knowledge accumulated that may help in the other BTN challenge repos
☆13Updated 9 years ago
Alternatives and similar repositories for Tools-and-Techniques
Users that are interested in Tools-and-Techniques are comparing it to the libraries listed below
Sorting:
- Hack your friend's online MMORPG game - specific focus, csrf/xss attacks☆91Updated 9 years ago
- Hack your friend's online MMORPG game - specific focus, php file upload scripts☆99Updated 8 years ago
- A demo of altering an opened tab after a timer☆122Updated 9 years ago
- Automated WiFi limit evasion☆119Updated 8 years ago
- The Hacker's ToolBox☆189Updated 8 years ago
- SQL injection vulnerabilities in Stack Overflow PHP questions☆173Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Jaidam is an open source penetration testing tool that would take as input a list of domain names, scan them, determine if wordpress or j…☆84Updated 7 years ago
- Pen test your "friend's" online MMORPG game - specific focus, sql injection opportunities☆419Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 9 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- A password cracker for Portable PHP password hashes☆67Updated 5 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Just a copy-paste XSS test file☆23Updated 13 years ago
- Universal MITM web server☆107Updated 8 years ago
- A webshell framework for penetration testers.☆299Updated 3 months ago
- Your interpreter isn’t safe anymore — The PHP module backdoor☆221Updated 6 years ago
- Brandis: End-to-end encryption for everyone☆79Updated 8 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Updated 8 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆134Updated 8 years ago
- Advanced Hash Manipulation☆176Updated 6 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆75Updated 7 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- ☆71Updated 10 years ago
- HOP: A proxy server to enable arbitrary protocols behind an HTTP proxy☆169Updated 9 years ago
- A Simple ARP Spoofer using Scapy☆106Updated 10 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 6 years ago