dirtbags / mothLinks
Monarch Of The Hill - base infrastructure for computer-based puzzle contests
☆9Updated last year
Alternatives and similar repositories for moth
Users that are interested in moth are comparing it to the libraries listed below
Sorting:
- recon framework in ruby☆13Updated 13 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Ruby bindings for the yara file analysis and classification library☆28Updated 13 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Basic file metadata gathering script☆21Updated last month
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- Open Source Network Security Platform☆40Updated 16 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 9 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- Docker configs and build scripts.☆22Updated 10 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- ☆14Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- ☆13Updated 7 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 9 years ago
- Ruby API client for the Censys internet-wide network-scan search engine☆10Updated 8 months ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago
- ☆11Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago