Some useful tools and scripts
☆47Feb 11, 2023Updated 3 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆11Jan 27, 2017Updated 9 years ago
- ☆25Oct 14, 2017Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- Write-ups for various CTF challenges solved by the team☆16Oct 6, 2017Updated 8 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- ☆17Apr 21, 2017Updated 8 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Feb 26, 2018Updated 8 years ago
- 一款基于subDomainsBrute子域名爆破工具结果的处理脚本☆10Jul 28, 2017Updated 8 years ago
- MITM to Capture FTP Credentials☆14Apr 27, 2022Updated 3 years ago
- shARP_2.0 is an updated version for shARP with more options for better performance.☆12Oct 12, 2017Updated 8 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 4 years ago
- Christian Buchner's & Christian H.'s CUDA miner project☆12Jul 22, 2014Updated 11 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆32Aug 4, 2014Updated 11 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 8 years ago
- Want to execute command repeatedly without workache? Here is shloop born for it!☆11Mar 2, 2022Updated 3 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Ansible Automatic deployment Mattermost on Linux☆10Jan 4, 2022Updated 4 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- 模拟请求工信部查询备案信息☆12Aug 29, 2018Updated 7 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- WooYun Network Scanner☆47Apr 24, 2020Updated 5 years ago
- 🏴 Collection of CTF solutions☆74Apr 7, 2019Updated 6 years ago
- 多线程网站目录穷举扫描修改版☆26Jun 17, 2016Updated 9 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- Chaosmap is an information gathering tool and dns / whois / web server scanner.☆15Jul 28, 2011Updated 14 years ago
- A collection of Nagios plugins that we package.☆41Mar 22, 2016Updated 9 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Oct 29, 2019Updated 6 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- A framework for automating penetration testing using a plugin based architecture☆41May 20, 2022Updated 3 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆34Nov 6, 2017Updated 8 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Describes the very basics of sql-injection☆12Apr 23, 2021Updated 4 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago