cyrus-and / gproxy
googleusercontent.com as HTTP(S) proxy
☆54Updated 4 years ago
Related projects: ⓘ
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 8 years ago
- ☆52Updated this week
- ☆60Updated this week
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- A multi service threaded MD5 cracker☆65Updated 8 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- ☆52Updated 8 years ago
- ☆37Updated this week
- ☆75Updated this week
- Wireless Reconnaissance And Intelligent Target Harvesting☆45Updated 8 years ago
- everything that does not fit elsewhere☆12Updated 6 years ago
- ☆42Updated 10 years ago
- ☆23Updated this week
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆71Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆6Updated 5 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 7 years ago
- ☆12Updated 7 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 7 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆22Updated 9 years ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Updated 13 years ago
- Install script for grsecurity for Debian environments☆59Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆135Updated 6 years ago
- Security tools to use on assessments.☆39Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆30Updated 6 years ago
- Search exploits in multiple exploit databases!☆80Updated 3 years ago