cudeso / security-toolsLinks
Security tools, scanners, exploit code
☆31Updated 7 years ago
Alternatives and similar repositories for security-tools
Users that are interested in security-tools are comparing it to the libraries listed below
Sorting:
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 5 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- ☆23Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- ☆18Updated last year
- ☆26Updated 5 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Tool for check the cookie flag in multiple sites☆26Updated 9 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- Windows Privesc Check☆20Updated 11 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Shodanwave - Netwave IP Camera☆18Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 9 years ago