epinna / researchesLinks
Security Advisories and Researches
☆16Updated 10 years ago
Alternatives and similar repositories for researches
Users that are interested in researches are comparing it to the libraries listed below
Sorting:
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- FWRF is a open source tool for firmware web-side analysis.☆12Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 13 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 11 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Password cracking utility☆53Updated 4 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 8 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Arp spoof detection tool☆24Updated 8 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆27Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago