This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variables/commands. Payloads can be generated through MSFVENOM or you can use your own ASM files.
☆17Nov 12, 2021Updated 4 years ago
Alternatives and similar repositories for fastoverflowtk
Users that are interested in fastoverflowtk are comparing it to the libraries listed below
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- simple code directory brute☆17Feb 26, 2021Updated 5 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 2 weeks ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated last year
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- ☆14May 30, 2018Updated 7 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆66Sep 19, 2019Updated 6 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Chromiux is a python based console app that extracts the encrypted saved passwords/cookies in txt format of chrome browser.☆19May 14, 2021Updated 4 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆40Oct 26, 2020Updated 5 years ago
- Fully Undetectable telegram Rat dropper☆35Nov 16, 2020Updated 5 years ago
- Static and dynamic Android application security analysis☆76Jun 2, 2024Updated last year
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- Okadminfinder rewrite by Xnuvers007☆16Apr 13, 2021Updated 4 years ago
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆36Mar 25, 2021Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆19Feb 11, 2026Updated 2 weeks ago
- Scriptable VSCode extension to generate or manipulate data. Stop pasting sensitive data in webpages.☆53Dec 16, 2025Updated 2 months ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- Open source tool for static analysis of malwares.☆29Jul 10, 2020Updated 5 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- This is the official repository for the back end of Mobilinux App.☆21Oct 1, 2023Updated 2 years ago
- Swagger Directory Enumeration (SDE)☆21Jan 16, 2021Updated 5 years ago
- A Python3 module to assist in fuzzing web applications☆57Jan 11, 2024Updated 2 years ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- An Automated Network Penetration and Vulnerability Analysis Tool Written In Bash☆29Apr 6, 2022Updated 3 years ago