cudeso / security-tools
Security tools, scanners, exploit code
☆31Updated 7 years ago
Alternatives and similar repositories for security-tools:
Users that are interested in security-tools are comparing it to the libraries listed below
- ☆15Updated 2 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Windows Privesc Check☆20Updated 10 years ago
- ☆20Updated 5 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated 11 months ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆22Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 7 years ago
- Group Policy Hijacking☆31Updated 6 years ago
- Methods of C2☆21Updated 9 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- ☆17Updated 7 years ago
- ☆11Updated 7 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- Shodanwave - Netwave IP Camera☆18Updated 7 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago