dirtyfilthy / lulz
lulz: automated webstalking tool
☆53Updated 8 years ago
Alternatives and similar repositories for lulz:
Users that are interested in lulz are comparing it to the libraries listed below
- ssh session type for metasploit☆98Updated 2 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Dynamic DNS Update Bruteforce Tool☆29Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆29Updated 9 years ago
- only for 31337☆22Updated 8 years ago
- The Bi-directional Link Extractor.☆53Updated 7 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- Software exploitation training material☆15Updated 7 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- Metasploit Framework with Viproy installed.☆36Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- A web app scanner☆26Updated 11 years ago
- Metasploit things, modules, plugins, exploits☆24Updated 10 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Password cracking utility☆53Updated 3 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago