dwisiswant0 / unchLinks
Hides message with invisible Unicode characters
☆96Updated last year
Alternatives and similar repositories for unch
Users that are interested in unch are comparing it to the libraries listed below
Sorting:
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆74Updated last month
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- masscan with exclusive excludes☆58Updated 2 years ago
- Drill into WARC web archives☆140Updated last year
- One line command and control backdoors for APIs and web applications.☆51Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134Updated 7 months ago
- Exploits Unauth Docker API☆42Updated 7 months ago
- A fork of the Go language with some tweaks☆53Updated 10 months ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆30Updated 3 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆51Updated 10 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 11 months ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Updated last year
- ☆56Updated 10 months ago
- Protection against HTML smuggling attacks.☆99Updated 5 months ago
- CVE-2023-7028☆59Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 8 months ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆39Updated 2 years ago
- ☆18Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 8 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Get root via TTY / TIOCSTI stuffing☆76Updated 7 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆202Updated 2 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- Find what egress ports are allowed☆46Updated 3 weeks ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 8 months ago
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆31Updated last year
- In-Memory Rootkit For Linux and BSD☆86Updated 4 months ago