brosck / ZorisLinks
γπͺγThe hidden hookless backdoor
β13Updated 7 months ago
Alternatives and similar repositories for Zoris
Users that are interested in Zoris are comparing it to the libraries listed below
Sorting:
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerabilityβ8Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.β20Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bountyβ14Updated 4 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.β13Updated 2 years ago
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.β8Updated 3 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people hβ¦β12Updated 3 years ago
- ShellC0de Generatorβ11Updated 4 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.β26Updated 2 years ago
- β19Updated last year
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilitiesβ31Updated 3 years ago
- Automate Blind SQL Injection with Python.β23Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.β16Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.β15Updated 11 months ago
- A tool to check for response status codes with easeβ14Updated 2 years ago
- PHP lab to test captcha bypassingβ31Updated last year
- Magento Security Scannerβ15Updated 3 years ago
- β‘ Golang library for quick make pentest toolsβ17Updated 3 months ago
- Recon-ng modules for basic OSINT.β11Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azureβ11Updated 3 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online maβ¦β13Updated 4 years ago
- β11Updated 3 months ago
- β14Updated 3 months ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloadsβ26Updated 3 years ago
- Recon (Whois)β15Updated 2 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339β17Updated 11 months ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.β22Updated 5 months ago
- Scripts to help automate tedious red teaming enumeration and tasks.β17Updated 5 years ago
- MAC Address brute forcing tool, used to bypass MAC based filteringβ16Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)β23Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 aβ¦β24Updated 4 years ago