foreni-packages / cisco-auditing-toolView external linksLinks
cisco-auditing-tool : Scans cisco routers for common vulnerabilities
☆15Sep 21, 2015Updated 10 years ago
Alternatives and similar repositories for cisco-auditing-tool
Users that are interested in cisco-auditing-tool are comparing it to the libraries listed below
Sorting:
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Jun 30, 2019Updated 6 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- Crack the verification hash of the encrypted payload of the Gauss Virus☆20Dec 25, 2021Updated 4 years ago
- Ophcrack : Windows password cracker based on rainbow tables☆16Sep 25, 2015Updated 10 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- mixed packet injector tool☆20Dec 29, 2020Updated 5 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 2 years ago
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago
- iPhone Backup Analyzer☆34Dec 7, 2012Updated 13 years ago
- giskismet – Wireless recon visualization tool☆55Aug 26, 2016Updated 9 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Brute forcing jwt tokens signed with HS256 since 2014☆60Aug 6, 2018Updated 7 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- davtest (improved)- Exploits WebDAV folders☆119Mar 7, 2023Updated 2 years ago
- Code from my old page ge.mine.nu☆36Feb 2, 2024Updated 2 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago
- t50 : Multi-protocol packet injector tool☆25Sep 20, 2015Updated 10 years ago
- Network based protocol fuzzer☆74Feb 17, 2022Updated 3 years ago
- Variety of kubectl krew tools usually security focused☆34Jul 17, 2025Updated 6 months ago
- Plattform to develop and experiment with existing java web attacks.☆31Jan 8, 2018Updated 8 years ago
- Dota 2 LUA scripts for umbrella☆12Apr 11, 2019Updated 6 years ago
- Getting BlindElephant into a working state, and updating the plugin files☆80Sep 2, 2020Updated 5 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- This Python script can enumerate all URLs present in robots.txt files, and test whether they can be accessed or not.☆47Feb 11, 2025Updated last year
- [Checker Emails Twitter + Login API Twitter] - API REST Twitter☆10Aug 18, 2018Updated 7 years ago
- URL Fuzzer/Spider☆34Apr 10, 2016Updated 9 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 13 years ago
- dotfiles☆11Jan 10, 2026Updated last month
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Access nearly every directory from within a sandboxed application.☆23Aug 12, 2010Updated 15 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year