A tiny chrome extension to record and replay your web application proof-of-concepts.
☆20Dec 1, 2016Updated 9 years ago
Alternatives and similar repositories for pocuito
Users that are interested in pocuito are comparing it to the libraries listed below
Sorting:
- Independent file type identification python library☆12Mar 16, 2023Updated 2 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- ☆12Jul 17, 2017Updated 8 years ago
- ☆18Oct 4, 2016Updated 9 years ago
- A simple Linux TCP client-server proxy able to redirect all data from one address to another by preserving source IP address.☆17Aug 23, 2017Updated 8 years ago
- Quick binary search for NTLM hash dataset☆18Jan 31, 2019Updated 7 years ago
- A simple python packet sniffer and manipulation tool for linux☆18Nov 26, 2015Updated 10 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- Viper is a brute-force password cracker.☆24Feb 10, 2016Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Dec 24, 2018Updated 7 years ago
- (mostly web related) web challenge writeups between 2011 and 2015☆21Jan 17, 2023Updated 3 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Mar 19, 2018Updated 7 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆172Dec 7, 2016Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Example HTML5-based GCS built on Dronekit. Runs on desktops via Electron.☆29Nov 30, 2015Updated 10 years ago
- HOP: A proxy server to enable arbitrary protocols behind an HTTP proxy☆169Sep 25, 2016Updated 9 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- A SIEM inspired by HECTOR, built on Django.☆27Apr 16, 2019Updated 6 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Jun 10, 2023Updated 2 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- NASM Standard Library for shellcode☆69Aug 4, 2016Updated 9 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- File transfer via DNS☆76May 21, 2017Updated 8 years ago
- Borrowed Instructions Synthetic Computation☆70Feb 20, 2015Updated 11 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- Poison, reset, spoof, redirect MITM script☆126Aug 5, 2023Updated 2 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Jun 25, 2024Updated last year
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- A File System Filter Driver for file I/O monitors, file access control, transparent file encryption.☆41Jan 25, 2026Updated last month
- Demo Application and Exploit☆35Mar 13, 2017Updated 8 years ago