evilsocket / Pynject
Pynject - An automatic MySQL injector and data dumper tool.
☆13Updated 14 years ago
Alternatives and similar repositories for Pynject:
Users that are interested in Pynject are comparing it to the libraries listed below
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- Format string exploit generation☆10Updated 9 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆10Updated 5 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆12Updated 9 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆27Updated 9 years ago
- Example packet.proxy plugins.☆22Updated 4 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- Leveraging CVE-2018-19788 without root shells☆18Updated 6 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 10 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Vulnerability Scanner☆12Updated 10 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- A web app scanner☆26Updated 10 years ago