etc5had0w / autoflowLinks
Windows Stack Based Auto Buffer Overflow Exploiter
☆20Updated 4 years ago
Alternatives and similar repositories for autoflow
Users that are interested in autoflow are comparing it to the libraries listed below
Sorting:
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Just another vulnerable web application.☆36Updated last year
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 11 months ago
- ☆49Updated 5 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Updated 11 months ago
- ☆24Updated 6 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated 2 years ago
- ☆43Updated 8 months ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆37Updated 2 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆25Updated last month
- ☆20Updated 3 years ago
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Google Meet Phishing Template For Gophish☆47Updated 3 years ago
- ☆19Updated 4 years ago
- ☆24Updated 11 months ago
- ☆38Updated 4 years ago
- ☆14Updated 5 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆52Updated 2 years ago
- ☆20Updated 4 years ago
- Bash script to generate reverse shell payloads☆19Updated 2 years ago
- Android Pentest Setup Environment☆30Updated 3 years ago
- https://www.nu11secur1ty.com☆22Updated last month
- ☆27Updated 2 years ago