hubert3 / iSniff
SSL man-in-the-middle tool targeting iOS devices < 4.3.5
☆37Updated 13 years ago
Alternatives and similar repositories for iSniff
Users that are interested in iSniff are comparing it to the libraries listed below
Sorting:
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Dynamic DNS Update Bruteforce Tool☆29Updated 8 years ago
- a collection of payloads for common webapps☆73Updated 12 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- BurpJDSer-ng☆28Updated 3 weeks ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- ☆13Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆40Updated 3 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Projects and POCs☆60Updated 10 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Updated 7 years ago
- ☆12Updated 10 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Operational toolset utilizing git's submodule feature☆57Updated 12 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago