cameronhotchkies / Absinthe
A Blind SQL Exploitation application
☆79Updated 12 years ago
Alternatives and similar repositories for Absinthe:
Users that are interested in Absinthe are comparing it to the libraries listed below
- Just a collection of pentest stuffs☆94Updated 5 years ago
- A blind SQL injection module that uses bitshfting to calculate characters.☆119Updated 2 years ago
- Homemade scripts to-do various vulnerable challenges☆77Updated 4 years ago
- Tool to help identify timing attacks☆69Updated 13 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Nikto for Windows with some extra features.☆180Updated 7 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Damn Vulnerable File Upload V 1.1☆101Updated 6 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- Getting BlindElephant into a working state, and updating the plugin files☆78Updated 4 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆171Updated last year
- Search drives for documents containing passwords☆62Updated 10 years ago
- ☆85Updated 9 years ago
- Database of websites for penetration testing☆174Updated 5 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 7 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆86Updated 8 years ago
- unix wildcard attacks☆131Updated 6 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆96Updated 6 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 9 years ago
- Amazon bucket brute force tool☆99Updated 11 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆104Updated 7 years ago
- Web Application Security☆125Updated 9 months ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆75Updated 10 years ago
- Common Findings Database☆100Updated 5 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago