cudeso / security-toolsLinks
Security tools, scanners, exploit code
☆31Updated 7 years ago
Alternatives and similar repositories for security-tools
Users that are interested in security-tools are comparing it to the libraries listed below
Sorting:
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated 2 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- Shodanwave - Netwave IP Camera☆18Updated 7 years ago
- a collection of payloads for common webapps☆73Updated 12 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated 7 months ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- ☆26Updated 5 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 6 years ago
- Tool for check the cookie flag in multiple sites☆26Updated 9 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- ☆47Updated 9 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Python version of OWASP's DirBuster Application.☆29Updated 10 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Group Policy Hijacking☆31Updated 7 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago