Just a simple SMTP server, implementation of @corpix smtpd library
☆15May 8, 2020Updated 5 years ago
Alternatives and similar repositories for simplesmtp
Users that are interested in simplesmtp are comparing it to the libraries listed below
Sorting:
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- TLS SNI virtual hosts bruteforcer☆22Aug 26, 2014Updated 11 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 6 months ago
- A list of checks with tips for analyzing the security of Android applications☆14Nov 19, 2019Updated 6 years ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- ☆13Jan 6, 2020Updated 6 years ago
- ☆23Oct 28, 2022Updated 3 years ago
- Sample Flutter application for Android☆10Jun 8, 2019Updated 6 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Collection of scripts to test your website against vulnerabilities.☆18Mar 10, 2024Updated 2 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- Tool to get the top android apps for bug bounty purpose☆17Sep 10, 2020Updated 5 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 4 months ago
- Custom Deserializer☆13Feb 1, 2017Updated 9 years ago
- Dig through the Wayback Machine and find sensitive or forgotten files exposed by web servers over time.☆27Mar 27, 2025Updated 11 months ago
- Auth microserivice Docker: Nginx -> Node -> Mongo☆12Oct 19, 2017Updated 8 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- ☆25Nov 20, 2023Updated 2 years ago
- How to improve NGINX performance, security, and other important things.☆11Jun 7, 2021Updated 4 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- Nuclei Templates Directory☆57Updated this week
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆22Jan 27, 2022Updated 4 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- ☆11Dec 31, 2018Updated 7 years ago
- Intentionally Vulnerable Demo App: .NET MVC, WCF, WebAPI, Web Forms☆21Feb 10, 2024Updated 2 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆68Jan 28, 2024Updated 2 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- BloodyAv is Custom Shell Code loader to Bypass Av and Edr.☆14Mar 21, 2022Updated 4 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- it's quite self explanatory: a crawler with sqlmap☆13Jul 13, 2017Updated 8 years ago
- ☆13May 30, 2024Updated last year
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago