Repository for proxenet plugins
☆14Jun 14, 2016Updated 9 years ago
Alternatives and similar repositories for proxenet-plugins
Users that are interested in proxenet-plugins are comparing it to the libraries listed below
Sorting:
- The ONLY hacker friendly proxy for webapp pentests.☆221Nov 29, 2016Updated 9 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Scan networks for SSH servers with default username and password☆12Oct 24, 2015Updated 10 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- It checks how secure the program you made is and shows how vulnerable your program is.☆20Apr 20, 2017Updated 8 years ago
- Web based code browser using clang to provide basic code analysis.☆46Jul 20, 2017Updated 8 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- A TE executable format loader for IDA☆28Sep 14, 2015Updated 10 years ago
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Dec 7, 2022Updated 3 years ago
- Threatbutt Suite☆37Jun 3, 2015Updated 10 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- An implementation of jpnevulator in Python☆21Jan 30, 2018Updated 8 years ago
- SSTP VPN client for Linux☆19Feb 1, 2021Updated 5 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 11 years ago
- A very simple Python script to take screenshots of websites☆18Aug 29, 2017Updated 8 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- strings for a Linux process' address space☆51Jun 15, 2013Updated 12 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Jan 11, 2015Updated 11 years ago
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- DirBuster successor in Erlang☆37Feb 16, 2017Updated 9 years ago
- a collection of payloads for common webapps☆72Apr 24, 2013Updated 12 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Alina Spark - Point of Sales Trojan☆49Feb 25, 2015Updated 11 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- Simple script for PGP encrypted newsletter☆26Feb 13, 2016Updated 10 years ago