Windows Stack Based Auto Buffer Overflow Exploiter
☆21Feb 19, 2021Updated 5 years ago
Alternatives and similar repositories for autoflow
Users that are interested in autoflow are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple tool which makes creating nuclei templates even easier.☆37Jun 23, 2024Updated last year
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- Shell Please 1.0 : Reverse shell code generator.☆36Jul 3, 2022Updated 3 years ago
- PENBUD is penetration testing buddy which helps you in penetration testing by making various important tools interactive.☆15Feb 4, 2021Updated 5 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Jul 27, 2019Updated 6 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Aug 26, 2021Updated 4 years ago
- ☆22Jul 16, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Apr 17, 2022Updated 3 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Nov 21, 2021Updated 4 years ago
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated 11 months ago
- ☆12Jun 16, 2021Updated 4 years ago
- Guide to SSRF☆74Oct 10, 2023Updated 2 years ago
- A simple place to learn XSS☆31Mar 20, 2021Updated 5 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- Modules Prestashop Vuln Arbitrary File Upload☆10Dec 29, 2019Updated 6 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Jan 16, 2021Updated 5 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 6 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 3 weeks ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- Learn what is NoSQL injection and how to find them ?☆10Jul 22, 2021Updated 4 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆34Aug 28, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 🍭 Web Application Vulnerability Scanner 🍭☆17May 21, 2022Updated 3 years ago
- ☆52Jun 11, 2019Updated 6 years ago
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.☆12Jun 22, 2022Updated 3 years ago
- A flask web app made for scanning vulnerabilites on a website, network exploitation, reconnaissance☆27Jan 16, 2023Updated 3 years ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 6 months ago
- A repository of JavaScript XSS attacks against client browsers☆104Jul 29, 2020Updated 5 years ago