Security tools, scanners, exploit code
☆31Oct 21, 2017Updated 8 years ago
Alternatives and similar repositories for security-tools
Users that are interested in security-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 11 months ago
- Broken web app intentionally built with pentesting obstacles☆16Jun 21, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- java unserialize vulnerability payload☆21Apr 20, 2019Updated 6 years ago
- an image bot that exploits png transparency quirks.☆10May 24, 2018Updated 7 years ago
- PHP synthetic test cases generator☆10Oct 15, 2023Updated 2 years ago
- ☆13Apr 11, 2018Updated 8 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 13 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Fault injection library☆22Dec 2, 2014Updated 11 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- Python Script to quickly check if a host is running NetScaler Gateway and/or AAA☆12Jul 27, 2023Updated 2 years ago
- Collection of scripts for radare2☆27Jan 1, 2019Updated 7 years ago
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- arbitrary memory read/write by IMemroy OOB☆36Apr 8, 2016Updated 10 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- 蜜罐捕获的数据☆12May 16, 2016Updated 9 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- ☆15Apr 9, 2018Updated 8 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Different tools, koen.vanimpe@cudeso.be☆138Jul 21, 2025Updated 8 months ago
- On the fly TCP and UDP network fuzzer☆16Jan 3, 2020Updated 6 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago