cr0hn / enteletaorView external linksLinks
Message Queue & Broker Injection tool
☆149May 8, 2023Updated 2 years ago
Alternatives and similar repositories for enteletaor
Users that are interested in enteletaor are comparing it to the libraries listed below
Sorting:
- Capture all RabbitMQ messages being sent through a broker.☆32Feb 13, 2021Updated 5 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- SSH brute forcer tool and library, using AsyncIO of Python 3.4☆36May 27, 2020Updated 5 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Aug 2, 2016Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 10 months ago
- ☆12Aug 29, 2025Updated 5 months ago
- HMAC timing attack's w/ statistical analysis☆23Sep 19, 2013Updated 12 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- ARM Shellcode Generator☆105Aug 26, 2017Updated 8 years ago
- Open Methodology for Security Tool Developers☆25Feb 23, 2016Updated 9 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆285Aug 8, 2021Updated 4 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Summit Route End Point Protection - Client code☆16Apr 10, 2016Updated 9 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- ☆42Jun 20, 2018Updated 7 years ago
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- The first open source vulnerability scanner for firmwares☆197Jul 18, 2016Updated 9 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79May 18, 2017Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- Tool to help with the exploitation of web application race conditions☆185Jul 3, 2018Updated 7 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- Fuzzing and Data Manipulation Framework (for GNU/Linux)☆163Feb 9, 2026Updated last week
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- XSS exploitation tool - access victims through HTTP proxy☆160Mar 19, 2014Updated 11 years ago
- A modular distributed penetration testing tool.☆41Dec 21, 2016Updated 9 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆138Dec 22, 2017Updated 8 years ago