hypnosec / evil-repoLinks
"><script>prompt(1)</script>''"><!--<svg>
☆18Updated 10 years ago
Alternatives and similar repositories for evil-repo
Users that are interested in evil-repo are comparing it to the libraries listed below
Sorting:
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 11 years ago
- ☆12Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 7 years ago
- ☆27Updated 8 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 9 years ago
- ☆32Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Cronbased Dirty Cow Exploit☆30Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆30Updated 9 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Updated 12 years ago
- Tagging and annotation framework for scan data☆101Updated 7 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18Updated 5 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- googleusercontent.com as HTTP(S) proxy☆54Updated 5 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆128Updated 12 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 16 years ago
- ☆54Updated 9 years ago
- Write Up I write for different CTFs☆12Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 10 years ago