☆20Jan 18, 2024Updated 2 years ago
Alternatives and similar repositories for various
Users that are interested in various are comparing it to the libraries listed below
Sorting:
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- LFI scan, exploit tool☆13Nov 19, 2014Updated 11 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- phpAudit is a simple shell script that scans PHP files for possible security risks.☆26Apr 7, 2013Updated 12 years ago
- Multithreaded SQL union bruteforcer☆16Sep 9, 2011Updated 14 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago
- A tool for netpens.☆37Jun 18, 2019Updated 6 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- A configurable XPath/XML injection testbed☆33Jul 19, 2013Updated 12 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆25Oct 25, 2020Updated 5 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Nov 9, 2018Updated 7 years ago
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Mar 13, 2014Updated 11 years ago
- Static DLL Patching and Hooking System☆25Sep 30, 2015Updated 10 years ago
- Don't use pypy, it's bad. Unmaintained, no longer used.☆23May 12, 2017Updated 8 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- S2-045 漏洞 POC-TOOLS CVE-2017-5638☆24Aug 18, 2021Updated 4 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆23Apr 11, 2018Updated 7 years ago
- A Burp Extender plugin, that will take deserialized AMF objects and encode them in XML using the Xtream library☆27Apr 14, 2015Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Scripts to prepare Windows system for debugging.☆31Jan 5, 2021Updated 5 years ago
- AFL "mostly" ported to cygwin☆26Apr 11, 2016Updated 9 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- A script that automatically redeems a Whiteout Survival gift code for a list of players☆14Oct 14, 2024Updated last year
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- Telegram AQI Bot based on nodejs☆31Jul 20, 2020Updated 5 years ago
- A multi-threaded Python tool to generate screenshot of websites☆31Dec 3, 2015Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- wooyun.org公开漏洞爬取☆23May 18, 2017Updated 8 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 8 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Deploy scikit-learn models to a REST API using Docker☆10May 1, 2023Updated 2 years ago