Repository for proxenet plugins
☆14Jun 14, 2016Updated 9 years ago
Alternatives and similar repositories for proxenet-plugins
Users that are interested in proxenet-plugins are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The ONLY hacker friendly proxy for webapp pentests.☆221Nov 29, 2016Updated 9 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 10 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Web based code browser using clang to provide basic code analysis.☆46Jul 20, 2017Updated 8 years ago
- A TE executable format loader for IDA☆28Sep 14, 2015Updated 10 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- zer0m0n driver for cuckoo sandbox☆24Feb 24, 2015Updated 11 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- A very simple Python script to take screenshots of websites☆18Aug 29, 2017Updated 8 years ago
- linux administration script,config files, misc☆23Jun 1, 2019Updated 6 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- SSTP VPN client for Linux☆19Feb 1, 2021Updated 5 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- a collection of payloads for common webapps☆72Apr 24, 2013Updated 12 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Jan 11, 2015Updated 11 years ago
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Dec 7, 2022Updated 3 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Threatbutt Suite☆37Jun 3, 2015Updated 10 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆24Apr 30, 2016Updated 9 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- HTTP framework☆48Aug 29, 2017Updated 8 years ago
- strings for a Linux process' address space☆51Jun 15, 2013Updated 12 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Scan networks for SSH servers with default username and password☆12Oct 24, 2015Updated 10 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 11 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Jul 17, 2013Updated 12 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago