Files from Zeronights presentation.
☆28Nov 23, 2012Updated 13 years ago
Alternatives and similar repositories for attacking_mongodb
Users that are interested in attacking_mongodb are comparing it to the libraries listed below
Sorting:
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Decorators to make REST easier in Bottle.☆21Jun 20, 2022Updated 3 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 9 years ago
- encoding format, library, and utilities for passive DNS data☆27Mar 29, 2024Updated last year
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated last month
- Automatically scans for malicious proxies.☆31Mar 7, 2015Updated 10 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- source&exe☆38Jul 18, 2017Updated 8 years ago
- RNT Arduino Projects☆11Dec 19, 2024Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- Maltego Transforms to Query Traffic Records☆34Oct 13, 2015Updated 10 years ago
- Tampermonkey script to extract information from Meteor applications☆34Nov 3, 2016Updated 9 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- Admin Panel Finder☆39Sep 22, 2025Updated 5 months ago
- The Smallest WiFi Button in the World (ESP8266, MQTT, IFTTT)☆14Aug 20, 2020Updated 5 years ago
- GPG key integration for Blockstack client applications☆10Aug 1, 2017Updated 8 years ago
- DeepAlign: Alignment-based Process Anomaly Correction Using Recurrent Neural Networks☆10Mar 25, 2023Updated 2 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- Burp extension that checks for interesting and security headers☆44Aug 12, 2020Updated 5 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆152Mar 20, 2021Updated 4 years ago
- Metarget技术交流群分享内容定期存档☆12Oct 22, 2021Updated 4 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Python wrapper of axel, a light command line download accelerator☆10Mar 26, 2017Updated 8 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- ☆11Nov 14, 2024Updated last year
- my personal .bashrc files, with all my alias, tricks and ascii art☆13Oct 22, 2020Updated 5 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago