hannob / svnscraper
bash script to download publicly available .svn directories
☆16Updated 7 years ago
Alternatives and similar repositories for svnscraper:
Users that are interested in svnscraper are comparing it to the libraries listed below
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- ☆15Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- Web of trust grapher☆39Updated 3 weeks ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- ☆25Updated 7 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 4 years ago
- Semantic SSH RSA keys☆25Updated 11 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 7 years ago
- XSS Weaponization☆34Updated 11 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- apbleed☆24Updated 10 years ago
- DNS zone transfer research☆58Updated 8 years ago
- You'll never take me alive.☆87Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- js-beautifier extension for Burp Suite☆30Updated 11 years ago