evilsocket / eve
(◍• ﹏•) - Hi, I'm Eve
☆21Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for eve
- Popping boxes with Nmap☆17Updated 12 years ago
- ☆15Updated 8 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- w3af packaging for Kali distribution☆26Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- Phishing Toolkit☆19Updated 6 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 5 years ago
- Format string exploit generation☆9Updated 9 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Tool for automation of GUI-based testing.☆15Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- An application for distributing oclHashcat tasks.☆21Updated 9 years ago