cisco-auditing-tool : Scans cisco routers for common vulnerabilities
☆15Sep 21, 2015Updated 10 years ago
Alternatives and similar repositories for cisco-auditing-tool
Users that are interested in cisco-auditing-tool are comparing it to the libraries listed below
Sorting:
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆45Dec 24, 2018Updated 7 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Jun 30, 2019Updated 6 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Ophcrack : Windows password cracker based on rainbow tables☆16Sep 25, 2015Updated 10 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- Crack the verification hash of the encrypted payload of the Gauss Virus☆20Dec 25, 2021Updated 4 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆42Oct 13, 2010Updated 15 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 2 years ago
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago
- iPhone Backup Analyzer☆34Dec 7, 2012Updated 13 years ago
- Monitor the textual data pasted into Windows clipboard☆29Nov 4, 2018Updated 7 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Brute forcing jwt tokens signed with HS256 since 2014☆60Aug 6, 2018Updated 7 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- Code from my old page ge.mine.nu☆36Feb 2, 2024Updated 2 years ago
- Network based protocol fuzzer☆74Feb 17, 2022Updated 4 years ago
- Variety of kubectl krew tools usually security focused☆34Jul 17, 2025Updated 7 months ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- lua scripts for dota2☆10Jul 28, 2019Updated 6 years ago
- Dota 2 LUA scripts for umbrella☆12Apr 11, 2019Updated 6 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- Getting BlindElephant into a working state, and updating the plugin files☆80Sep 2, 2020Updated 5 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- This Python script can enumerate all URLs present in robots.txt files, and test whether they can be accessed or not.☆47Feb 11, 2025Updated last year
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- URL Fuzzer/Spider☆34Apr 10, 2016Updated 9 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- A powershell script sort objects naturally.☆13May 26, 2021Updated 4 years ago
- [Checker Emails Twitter + Login API Twitter] - API REST Twitter☆10Aug 18, 2018Updated 7 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Scripts to automate RECON process☆11Aug 31, 2025Updated 6 months ago
- Sample code for ret2usr (and ret2dir) kernel attacks☆10Nov 23, 2016Updated 9 years ago