cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches
☆45Dec 24, 2018Updated 7 years ago
Alternatives and similar repositories for cisco-global-exploiter
Users that are interested in cisco-global-exploiter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Sep 20, 2015Updated 10 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- My curated list of best Stackoverflow questions that I have come across. Contributions are welcome!!☆13Jan 24, 2021Updated 5 years ago
- A Github organization reconnaissance tool.☆218May 22, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PoC code for CVE-2018-9539☆20Nov 11, 2018Updated 7 years ago
- dhcpig : initiates an advanced DHCP exhaustion attack☆61Sep 20, 2015Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- mixed packet injector tool☆20Dec 29, 2020Updated 5 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆43Feb 6, 2019Updated 7 years ago
- ☆12May 9, 2017Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Poison, reset, spoof, redirect MITM script☆127Aug 5, 2023Updated 2 years ago
- Attack Tree modeling sheet for Dia☆20Oct 9, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/sqlifuzzer☆12May 22, 2015Updated 10 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- dockscan is security vulnerability and audit scanner for Docker installations☆219Aug 27, 2016Updated 9 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Ophcrack : Windows password cracker based on rainbow tables☆16Sep 25, 2015Updated 10 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- A tool for detecting regular expression denial-of-service vulnerabilities in Android apps.☆36Jun 24, 2016Updated 9 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Database of websites for penetration testing☆183Jan 15, 2020Updated 6 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆47Jun 10, 2016Updated 9 years ago
- t50 : Multi-protocol packet injector tool☆25Sep 20, 2015Updated 10 years ago
- Automatic USB drive malware scanning tool for the security-minded person☆96Sep 14, 2016Updated 9 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago