Automatically scans for malicious proxies.
☆31Mar 7, 2015Updated 10 years ago
Alternatives and similar repositories for maliciousProxyScanner
Users that are interested in maliciousProxyScanner are comparing it to the libraries listed below
Sorting:
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- A small and dirty Python 2 decompiler written in Python.☆13Dec 29, 2013Updated 12 years ago
- A cross-platform custom NOR firmware loader and custom IPSW generator for the iPhone☆16Oct 11, 2014Updated 11 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- My utils written for Reverse Engineering, mainly in python☆49Feb 11, 2014Updated 12 years ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- $ gem install esearchy [ NO LONGER MAINTAINED - ONLY FIXES AND MINOR UPDATES ] https://github.com/FreedomCoder/esearchy_mirai☆18Jul 6, 2012Updated 13 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly☆18Oct 7, 2015Updated 10 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Intel PIN rocks☆15Jun 5, 2012Updated 13 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- An implementation of an extension of the Local Descriptors Encoded by Fisher Vectors method for person re-identification.☆13Nov 30, 2014Updated 11 years ago
- ☆17Aug 9, 2017Updated 8 years ago
- AD-control-paths LDAP submodule☆19Jun 20, 2018Updated 7 years ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- Central Repo for Burp extensions☆150Nov 18, 2021Updated 4 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- A simple port forwarding utility for TCP and UDP☆14Oct 7, 2013Updated 12 years ago
- ☆20Nov 22, 2016Updated 9 years ago