hypnosec / evil-repoLinks
"><script>prompt(1)</script>''"><!--<svg>
☆17Updated 9 years ago
Alternatives and similar repositories for evil-repo
Users that are interested in evil-repo are comparing it to the libraries listed below
Sorting:
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- ☆12Updated 8 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- ☆15Updated 9 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- Asynchronous scanning library☆21Updated 10 years ago
- CVE-2015-3152 PoC☆43Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Exploits and research stuffs☆56Updated 2 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 9 years ago
- Certificate Expiration Monitor script☆27Updated 6 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- ☆12Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- ☆33Updated 10 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 11 years ago
- ☆27Updated 8 years ago
- An implementation of the hashcat rules engine in javascript☆49Updated 7 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- Mass scanning and fuzzing library☆48Updated 7 years ago