epinna / researches
Security Advisories and Researches
☆15Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for researches
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Honeypot for router backdoor (TCP 32764)☆16Updated 10 years ago
- Collection of cracked malware☆14Updated 5 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- Tool for automation of GUI-based testing.☆15Updated 9 years ago
- A web app scanner☆26Updated 10 years ago
- Scanner for document roots/URLs.☆14Updated 13 years ago
- All tools you needed during penetration testing.☆17Updated 7 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Phishing Toolkit☆19Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆12Updated 8 years ago
- Software exploitation training material☆15Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆11Updated 8 years ago
- Educational Python penetration testing framework☆10Updated 6 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Automated install process for Phishing Frenzy☆23Updated 9 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 12 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Optional plugins for MITMf☆15Updated 9 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- ssh session type for metasploit☆97Updated last year
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Collection of Nmap scripts☆10Updated 8 years ago