hexadecimal & URL encoder + decoder
☆77Sep 28, 2017Updated 8 years ago
Alternatives and similar repositories for hURL
Users that are interested in hURL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Hasherdotid☆11Jul 10, 2018Updated 7 years ago
- Look for a backdoor shell on the website☆14Jul 17, 2018Updated 7 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 12 years ago
- php-cli vulnerability scanner☆79Jun 29, 2015Updated 10 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Oct 21, 2017Updated 8 years ago
- Axis2 RPC Shell☆14Sep 10, 2015Updated 10 years ago
- Trying to be the best tool to search for exploits in the terminal.☆21Oct 23, 2022Updated 3 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- Tools for installing Linux distros on Android easily and quickly without any hassle☆11Oct 16, 2025Updated 6 months ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- ☆28Feb 11, 2016Updated 10 years ago
- MSFvenom Payload Creator (MSFPC)☆1,323May 9, 2021Updated 4 years ago
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Burp Suite extension to generate Intruder payloads using Radamsa☆90Sep 7, 2017Updated 8 years ago
- Search exploits in multiple exploit databases!☆12Feb 8, 2016Updated 10 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆10Apr 25, 2021Updated 4 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Oct 7, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Pentesting Tools to Automatize Active Directory Hacking☆23Sep 20, 2022Updated 3 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Metasploit Framework☆26Feb 10, 2026Updated 2 months ago
- Fake Deface☆16Sep 3, 2018Updated 7 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- A tool for reverse engineering Android apk files☆13Nov 30, 2018Updated 7 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- MassBleed SSL Vulnerability Scanner☆247Apr 18, 2020Updated 6 years ago