byt3bl33d3r / jamaal-re-toolsLinks
Automatically exported from code.google.com/p/jamaal-re-tools
☆12Updated 9 years ago
Alternatives and similar repositories for jamaal-re-tools
Users that are interested in jamaal-re-tools are comparing it to the libraries listed below
Sorting:
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 9 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 10 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 13 years ago
- Just a collection of scripts☆40Updated 5 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆59Updated 2 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago