Random Code
☆25Apr 18, 2011Updated 15 years ago
Alternatives and similar repositories for carnal0wnage-code
Users that are interested in carnal0wnage-code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metasploit modules that didn't make it into trunk for some reason or the other☆118Jun 17, 2017Updated 8 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Feb 11, 2012Updated 14 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Meterpreter Scripts that I'm working on☆171Jan 28, 2019Updated 7 years ago
- A BurpSuite extension for lair☆28Oct 18, 2017Updated 8 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 4 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 15 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- Ruby ALPC Fuzzer ( joke )☆24Oct 12, 2014Updated 11 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.☆58May 1, 2015Updated 11 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago
- Advanced XPath Injection Tool☆33Jan 29, 2026Updated 3 months ago
- Lutech TMS EHAT-NG☆14Jul 8, 2017Updated 8 years ago
- Provides String#to_regexp☆28Jun 14, 2020Updated 5 years ago
- jnlpdownloader is a Python script that takes a URL to a JNLP and downloads all the associated JARs and native libraries. Another Java ba…☆14Aug 16, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Ruby interface to cirt.net default passwords database☆19May 4, 2011Updated 15 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- ☆20Jul 25, 2019Updated 6 years ago
- Risu is Nessus parser, that converts the generated reports into a ActiveRecord database, this allows for easy report generation and vulne…☆63Apr 3, 2026Updated last month
- Write simple security regression tests for your network infrastructure.☆19Jul 4, 2012Updated 13 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- A common database library for managing and querying security data☆18Jan 12, 2026Updated 3 months ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆23Jul 1, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Collection of binaries and scripts found across the net☆20Dec 2, 2013Updated 12 years ago
- Method for storing and unsealing Hashicorp Vault using Ansible and Mac Keychain☆14Nov 29, 2017Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Dec 17, 2015Updated 10 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 13 years ago