cr0mll / deserterView external linksLinks
A targeted DNS cache poisoner
☆124Oct 1, 2022Updated 3 years ago
Alternatives and similar repositories for deserter
Users that are interested in deserter are comparing it to the libraries listed below
Sorting:
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Mar 6, 2023Updated 2 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Aug 4, 2023Updated 2 years ago
- ☆16Apr 24, 2021Updated 4 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 4 years ago
- Automatic reverse/bind shell generator cheat sheet.☆34Jan 9, 2023Updated 3 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Dump Linux keyrings☆23Jul 15, 2024Updated last year
- 🐳 VMs are bloat. Dockerise your VAPT environment☆78Apr 19, 2025Updated 9 months ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- Offensive cybersecurity toolkit for vulnerability analysis and penetration testing of OBD-II devices.☆29Sep 23, 2025Updated 4 months ago
- redteamrecipe.com☆24Feb 9, 2024Updated 2 years ago
- A Pictorial Book of Tor Hidden Services.☆25Dec 1, 2017Updated 8 years ago
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆18Sep 19, 2021Updated 4 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Sep 6, 2024Updated last year
- Custom scan profiles for use with Burp Suite Pro☆151Mar 21, 2024Updated last year
- Fast CLI tool to find the parameters that can be used to find SSRF or Out-of-band resource load☆297Sep 22, 2024Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Apr 19, 2023Updated 2 years ago
- A simple multi-threaded distributed SSH brute-forcing tool written in Python☆462Oct 30, 2022Updated 3 years ago
- Tomcat backdoor based on CS blog☆29Jun 30, 2023Updated 2 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated last year
- Fast Endpoint Scanner☆55Dec 23, 2020Updated 5 years ago
- Bash script that automates the enumeration of domain, subdomains & web servers in the active information gathering.☆58Sep 7, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,149Updated this week
- CVE2020-0796 SMBv3 RCE☆61Mar 15, 2020Updated 5 years ago
- ☆14Apr 2, 2022Updated 3 years ago
- Fast Pair BLE Spammer☆28Dec 23, 2023Updated 2 years ago
- UHF tag and IC database☆26Feb 5, 2026Updated last week
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- A websocket-based reverse (javascript) shell for XSS attacks.☆30Sep 2, 2022Updated 3 years ago
- Nim Library for Offensive Security Development☆198Sep 4, 2023Updated 2 years ago
- Easy red team phishing with Puppeteer☆133Feb 6, 2023Updated 3 years ago
- Roast in the Middle☆296Sep 19, 2025Updated 4 months ago
- Public repo of the SDLauncher Sinden gun configuration assistant☆12May 24, 2021Updated 4 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆77Mar 14, 2023Updated 2 years ago
- ☆10Aug 4, 2020Updated 5 years ago