cameronhotchkies / Absinthe
A Blind SQL Exploitation application
☆79Updated 12 years ago
Alternatives and similar repositories for Absinthe
Users that are interested in Absinthe are comparing it to the libraries listed below
Sorting:
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Homemade scripts to-do various vulnerable challenges☆77Updated 4 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆171Updated last year
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 7 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 10 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆85Updated 8 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- Search drives for documents containing passwords☆63Updated 10 years ago
- A blind SQL injection module that uses bitshfting to calculate characters.☆123Updated 2 years ago
- Tool to help identify timing attacks☆69Updated 13 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 10 years ago
- Penetration testing scripts☆143Updated 6 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆194Updated 9 years ago
- Damn Vulnerable File Upload V 1.1☆101Updated 6 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- Browse and search through nmap's NSE scripts.☆59Updated 7 years ago
- Passive Vulnerability Auditor☆133Updated 8 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- ☆241Updated 5 years ago
- Nikto for Windows with some extra features.☆180Updated 8 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆102Updated 7 years ago
- unix wildcard attacks☆133Updated 6 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago
- udp-proto-scanner is a Perl script which discovers UDP services by sending triggers to a list of hosts☆98Updated 11 months ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆115Updated 4 years ago
- Database of websites for penetration testing☆174Updated 5 years ago