scripts for pentesting
☆87Oct 5, 2018Updated 7 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- miscellaneous handy pentesting tools☆63Jan 1, 2021Updated 5 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Jul 9, 2020Updated 5 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Aug 19, 2018Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Jul 17, 2016Updated 9 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Nano meterpreter shell based on TinyMet