cameronhotchkies / Absinthe
A Blind SQL Exploitation application
☆79Updated 12 years ago
Alternatives and similar repositories for Absinthe:
Users that are interested in Absinthe are comparing it to the libraries listed below
- A blind SQL injection module that uses bitshfting to calculate characters.☆117Updated 2 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- Drag and Drop ClickJacking PoC development assistance tool.☆193Updated 4 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago
- Passive Vulnerability Auditor☆130Updated 8 years ago
- Search drives for documents containing passwords☆63Updated 10 years ago
- Just a collection of pentest stuffs☆95Updated 5 years ago
- SMB Spider is a lightweight python utility for searching SMB/CIFS/Samba file shares. While performing a penetration test, the need to sea…☆133Updated 3 years ago
- Nikto for Windows with some extra features.☆180Updated 7 years ago
- Homemade scripts to-do various vulnerable challenges☆76Updated 4 years ago
- Tool to help identify timing attacks☆69Updated 13 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- Check for valid credentials across a network over SMB☆258Updated last year
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆95Updated 2 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 4 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆75Updated 10 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Local File Inclusion Exploitation Tool (mirror)☆123Updated 8 years ago
- ☆179Updated 11 years ago
- Getting BlindElephant into a working state, and updating the plugin files☆77Updated 4 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- unix wildcard attacks☆132Updated 6 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆104Updated 7 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- ☆63Updated 12 years ago
- Penetration testing scripts☆143Updated 6 years ago