Files from Zeronights presentation.
☆28Nov 23, 2012Updated 13 years ago
Alternatives and similar repositories for attacking_mongodb
Users that are interested in attacking_mongodb are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- A friendlier interface to `socket`.☆14Apr 11, 2015Updated 10 years ago
- GPU methods for alpha matting, including cutting edge research algorithms by Philip G. Lee.☆12Jan 8, 2014Updated 12 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- Some concept code for bypassing the Android lock screen from recovery mode☆16Mar 28, 2011Updated 14 years ago
- Multicast Proxy for OpenBSD☆16Mar 29, 2023Updated 2 years ago
- Simple LDAP client for OpenBSD using aldap, pledge(2) and no OpenLDAP☆15Jun 13, 2018Updated 7 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Dec 6, 2024Updated last year
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- A simple python script that exploits blind SQL Injections. Useful for PoCs.☆26Jul 31, 2013Updated 12 years ago
- JavaScript component to parse, clean, remove formatting (unformat) numbers in strings.☆10Dec 5, 2024Updated last year
- Ansible role to set up locales in Debian-like systems☆21Aug 9, 2017Updated 8 years ago
- A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!☆10Mar 2, 2013Updated 13 years ago
- Official OWASP Top 10 Document Repository☆10Jan 9, 2018Updated 8 years ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 10 years ago
- zygotebench - benchmark process creation speed on Android☆14Dec 4, 2013Updated 12 years ago
- collection of evil code☆14Feb 20, 2013Updated 13 years ago
- A simple desktop Wiki engine built around Markdown and git☆17Nov 15, 2021Updated 4 years ago
- ☆18Oct 22, 2015Updated 10 years ago
- ☆10Jun 25, 2022Updated 3 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- Try harder to bypass that WAF...☆14Jan 4, 2015Updated 11 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- ☆10Apr 6, 2016Updated 9 years ago
- Burp extension that checks for interesting and security headers☆44Aug 12, 2020Updated 5 years ago
- ☆11Oct 21, 2020Updated 5 years ago
- 🦊A cloudflare DNS over HTTPs resolver client library.☆12Jan 10, 2023Updated 3 years ago
- Archive of Metasploit Framework v1 (Perl)☆13Sep 29, 2014Updated 11 years ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- Extremely lightweight monitoring system.☆25Apr 22, 2015Updated 10 years ago
- DC619/DC858 Mainframe Environment/Lab☆11Dec 9, 2021Updated 4 years ago
- A Burp Extension that makes it easier to view all script code on a Response.☆17Nov 12, 2023Updated 2 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago