flabbergastedbd / nightfuryLinks
☆33Updated 8 years ago
Alternatives and similar repositories for nightfury
Users that are interested in nightfury are comparing it to the libraries listed below
Sorting:
- Python and Machine Learning Workshop at Hack.lu 2017☆82Updated 7 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- ☆42Updated 3 years ago
- ☆15Updated 9 years ago
- defplorex for BlackHat Arsenal☆116Updated 7 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- ☆84Updated 8 years ago
- ☆46Updated 9 years ago
- Vulners signature-base software version detection rules☆37Updated 3 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Updated 4 years ago
- Ruby interface to cirt.net default passwords database☆19Updated 14 years ago
- DoS PoC's for SAP products☆52Updated 7 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆51Updated 8 years ago
- Simple socket-based gateway to the Burp Collaborator☆33Updated 8 years ago
- Identifies phishing websites using a treebag model☆22Updated 4 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆53Updated 10 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 8 years ago
- Struts2 S2-045-Nmap NSE script☆51Updated 8 years ago
- 一个监控 pastebin 的敏感内容,并发微博的 bot☆15Updated 7 years ago
- security machine learning☆72Updated 8 years ago
- ☆14Updated 7 years ago
- ☆79Updated 2 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Updated 6 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Updated 8 years ago
- Burp scanner plugin based on Vulners.com vulnerability database☆25Updated 8 years ago
- Snort rules☆35Updated 6 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago
- A dsniff project using bro☆10Updated 9 years ago