fnord0 / hURL
hexadecimal & URL encoder + decoder
☆74Updated 7 years ago
Alternatives and similar repositories for hURL:
Users that are interested in hURL are comparing it to the libraries listed below
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Tool to help identify timing attacks☆69Updated 13 years ago
- unix wildcard attacks☆133Updated 6 years ago
- Search drives for documents containing passwords☆63Updated 10 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆77Updated 10 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆90Updated 11 years ago
- Admin Panel Finder☆38Updated last year
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆60Updated 6 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆49Updated 4 years ago
- Easy 802.1Q VLAN Hopping☆80Updated 9 months ago
- Linux Local Enumeration Script☆79Updated 4 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆47Updated 6 years ago
- Homemade scripts to-do various vulnerable challenges☆77Updated 4 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆37Updated 2 months ago
- Linux pentest tools☆87Updated 5 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆43Updated 9 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆62Updated 8 years ago