hypnosec / evil-repoLinks
"><script>prompt(1)</script>''"><!--<svg>
☆17Updated 10 years ago
Alternatives and similar repositories for evil-repo
Users that are interested in evil-repo are comparing it to the libraries listed below
Sorting:
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 11 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- ☆16Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- Python SDK to access the vulnerability database☆22Updated 6 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- Exploits and research stuffs☆54Updated 2 months ago
- Cronbased Dirty Cow Exploit☆30Updated 8 years ago
- A simpe decoder to decode requests/responses made by PokemonGo in burp☆24Updated 9 years ago
- ☆32Updated 10 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 9 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- SSRF Protection Library for PHP - http://safecurl.fin1te.net☆73Updated 2 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- js-beautifier extension for Burp Suite☆30Updated 12 years ago
- ☆12Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 10 years ago
- HMAC timing attack's w/ statistical analysis☆23Updated 12 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆107Updated 9 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆23Updated 10 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago