hypnosec / evil-repoView external linksLinks
"><script>prompt(1)</script>''"><!--<svg>
☆18Nov 20, 2015Updated 10 years ago
Alternatives and similar repositories for evil-repo
Users that are interested in evil-repo are comparing it to the libraries listed below
Sorting:
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- An asynchronous AWS client on Tornado.☆41Jul 25, 2020Updated 5 years ago
- Python requirements.txt parser☆14Feb 13, 2015Updated 11 years ago
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆42Feb 6, 2019Updated 7 years ago
- RESTful interface to your operating system shell☆19Nov 8, 2017Updated 8 years ago
- Open Hardware SPI programmer based on FTDI FT232H☆23Nov 25, 2012Updated 13 years ago
- Fuzz testing framework for security research☆30Jun 19, 2014Updated 11 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- Abbott breaks promises. Turns them back into CPS style☆26Oct 20, 2015Updated 10 years ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Feb 16, 2017Updated 9 years ago
- Extraction of iMessage Data via XSS☆51Apr 8, 2016Updated 9 years ago
- MPRESS dumper for OS X☆65Nov 11, 2014Updated 11 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆97Aug 23, 2018Updated 7 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166May 19, 2023Updated 2 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Aug 28, 2015Updated 10 years ago
- Asynchronous DNS lookups for Tornado☆49Mar 31, 2015Updated 10 years ago
- ☆38Jan 14, 2022Updated 4 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Apr 14, 2016Updated 9 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- Your last stop for password list generation needs!☆27Mar 4, 2015Updated 10 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆81Jul 21, 2015Updated 10 years ago
- Two or three subtypes of high grade serous ovarian cancer subtypes fit data from different populations better than four☆12Oct 10, 2018Updated 7 years ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated 2 weeks ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- ☆73Oct 15, 2014Updated 11 years ago
- My hopelessly idiosyncratic music software☆11Aug 18, 2018Updated 7 years ago
- Adding client SOCKS support to Twisted.☆18Feb 2, 2014Updated 12 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 5 months ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago