Recursively searches a directory for any file containing a specified string
☆48Jul 5, 2015Updated 10 years ago
Alternatives and similar repositories for toby
Users that are interested in toby are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆32Mar 21, 2015Updated 11 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Find websites with script URLs matching given regex☆11Apr 11, 2015Updated 10 years ago
- debian scripts and code☆18Jul 29, 2016Updated 9 years ago
- This firewall allows only communications made from allowed processes.☆13Aug 10, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Mar 19, 2015Updated 11 years ago
- Password analysis software☆38Jun 24, 2015Updated 10 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Multi-mode wireless LAN Based on a Software Access point for Kali Linux.☆54Sep 22, 2018Updated 7 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- Searches for interesting cached DNS entries.☆56May 15, 2014Updated 11 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- The state of the art, modular, portable and easily extensible MITM framework in a Docker Container.☆14Dec 30, 2017Updated 8 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- ☆12Nov 22, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- SMBMap is a handy SMB enumeration tool☆38Jun 18, 2024Updated last year
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- Converts Half-WPA handshake to hashcat☆19Oct 29, 2018Updated 7 years ago
- Ansible Provisioned Security Testing Platform☆17Oct 19, 2016Updated 9 years ago
- Prints the IPs on your local network that're sending the most packets☆155Jul 20, 2021Updated 4 years ago