epinna / researchesLinks
Security Advisories and Researches
☆15Updated 11 years ago
Alternatives and similar repositories for researches
Users that are interested in researches are comparing it to the libraries listed below
Sorting:
- Bypass XSS Reflected Cross-site scripting☆33Updated 10 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- The Bi-directional Link Extractor.☆53Updated 8 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆47Updated 3 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 12 years ago
- Password cracking utility☆54Updated 4 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Small backdoor using cookie.☆64Updated 9 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Updated 13 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 11 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 11 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 8 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Metasploit things, modules, plugins, exploits☆26Updated 11 years ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago