exploitsecurityio / ExploitToolFinderLinks
The ExploitToolFinder Utility [by exploitsecurity.io] assists security researchers in their quest to find the right tool for the job
☆17Updated 2 years ago
Alternatives and similar repositories for ExploitToolFinder
Users that are interested in ExploitToolFinder are comparing it to the libraries listed below
Sorting:
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- Legba recipes.☆51Updated last year
- A learning and testing environment for web application hacking and pentesting.☆27Updated 5 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 3 years ago
- A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard☆31Updated 2 years ago
- ☆34Updated 2 years ago
- ☆25Updated 2 months ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated 2 years ago
- ChatGPT queries via OpenAI API in your terminal☆62Updated 2 years ago
- ☆43Updated 8 months ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- ☆33Updated 2 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆28Updated 2 years ago
- ☆25Updated 6 months ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆58Updated last year
- Commands used in Windows penetration tests☆55Updated 2 months ago
- Quick network scanner library. https://crates.io/crates/qscan☆90Updated 3 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆50Updated last year
- Windows File Integrity -- an archive of information on installed Windows binaries.☆32Updated 3 years ago
- ☆36Updated 3 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆178Updated 8 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers …☆49Updated 7 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 3 months ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago