dwisiswant0 / unchLinks
Hides message with invisible Unicode characters
☆95Updated last year
Alternatives and similar repositories for unch
Users that are interested in unch are comparing it to the libraries listed below
Sorting:
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆73Updated 2 weeks ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆45Updated last year
- masscan with exclusive excludes☆58Updated 2 years ago
- Drill into WARC web archives☆141Updated last year
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆29Updated 3 years ago
- One line command and control backdoors for APIs and web applications.☆51Updated last year
- Check IP addresses against known cloud provider IP address ranges☆46Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- ☆16Updated 6 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆39Updated 2 years ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- ☆18Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Tools to Exploit Bitwarden v2023.3.0 with Windows Hello☆31Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆68Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 7 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆55Updated 10 months ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆69Updated last month
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- Exploits Unauth Docker API☆42Updated 7 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆83Updated 6 months ago
- Repo for all my exploits/PoCs☆53Updated 6 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆54Updated 6 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆50Updated 10 months ago
- A TLS MITM proxy for TCP/TLS/DTLS/UDP traffic, with support for TLS upgrades like STARTTLS, PostgreSQL, and more.☆301Updated last week
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year