iSECPartners / LibTech-Auditing-Cheatsheet
☆198Updated 9 years ago
Alternatives and similar repositories for LibTech-Auditing-Cheatsheet:
Users that are interested in LibTech-Auditing-Cheatsheet are comparing it to the libraries listed below
- iSEC Partners' research publications☆76Updated 8 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- ☆32Updated 9 years ago
- Common Findings Database☆100Updated 5 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 11 months ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- ☆113Updated 7 years ago
- This is a tool to instantly test if an application handles SSL certificates the way it is supposed to.☆25Updated 2 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- ☆27Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 7 years ago
- ☆44Updated 7 years ago
- Exploits and research stuffs☆54Updated last year
- Python SDK to access the vulnerability database☆22Updated 5 years ago
- Store Burp data and collaborate via git☆53Updated 5 years ago
- POLAR☆73Updated 6 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- A tool for netpens.☆37Updated 5 years ago
- ☆90Updated 3 months ago