fozavci / metasploit-framework-with-viproy
Metasploit Framework with Viproy installed.
☆35Updated 7 years ago
Related projects: ⓘ
- ☆47Updated 8 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆52Updated 4 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 4 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- ☆84Updated this week
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- ☆63Updated this week
- ☆19Updated this week
- ssh session type for metasploit☆97Updated last year
- a collection of payloads for common webapps☆73Updated 11 years ago
- A collection of Nmap NSE scripts that I made.☆26Updated 11 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- ☆30Updated this week
- Shell-style script to search exploit-db.com exploits.☆59Updated last week
- Metasploit Usage Wiki☆47Updated 9 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 4 months ago
- Intelligent threat hunter and phishing servers☆46Updated 5 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆57Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- ☆10Updated this week
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- ☆68Updated this week
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆76Updated 7 years ago
- ☆29Updated this week
- Automated HaveIbeenPwned lookups using theharvester results☆49Updated 6 years ago
- ☆61Updated this week
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆60Updated 8 years ago
- Multi-threaded SSH Password Auditor☆92Updated 10 years ago