Automatically scans for malicious proxies.
☆31Mar 7, 2015Updated 11 years ago
Alternatives and similar repositories for maliciousProxyScanner
Users that are interested in maliciousProxyScanner are comparing it to the libraries listed below
Sorting:
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- $ gem install esearchy [ NO LONGER MAINTAINED - ONLY FIXES AND MINOR UPDATES ] https://github.com/FreedomCoder/esearchy_mirai☆18Jul 6, 2012Updated 13 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- PGT allows you to generate pcaps using python without touching the network in any way. It is dependent upon scapy.☆29Jan 3, 2022Updated 4 years ago
- A tool to generate graph and other output from NMAP XML files☆116Mar 9, 2019Updated 7 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Host files with DNS☆33Mar 1, 2016Updated 10 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Feb 20, 2015Updated 11 years ago
- php-cli vulnerability scanner☆79Jun 29, 2015Updated 10 years ago
- Files from Zeronights presentation.☆28Nov 23, 2012Updated 13 years ago
- ☆27Sep 4, 2017Updated 8 years ago
- A cross-platform custom NOR firmware loader and custom IPSW generator for the iPhone☆16Oct 11, 2014Updated 11 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 9 years ago
- A small and dirty Python 2 decompiler written in Python.☆13Dec 29, 2013Updated 12 years ago
- ☆14Feb 25, 2025Updated last year
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- Take full control of a OSX user or root account via command line.☆101May 18, 2018Updated 7 years ago
- ☆20Nov 22, 2016Updated 9 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago