iSECPartners / ZigToolsLinks
☆11Updated 11 years ago
Alternatives and similar repositories for ZigTools
Users that are interested in ZigTools are comparing it to the libraries listed below
Sorting:
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
 - SQL Injection without the pain of syringes.☆25Updated 8 years ago
 - Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
 - PHP Phishing Framework☆28Updated 11 years ago
 - Software exploitation training material☆16Updated 8 years ago
 - hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
 - Password cracking utility☆53Updated 4 years ago
 - A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 10 years ago
 - Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
 - Automated install process for Phishing Frenzy☆23Updated 10 years ago
 - Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
 - Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
 - Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
 - Phishing Toolkit☆20Updated 7 years ago
 - ☆24Updated 9 years ago
 - ☆20Updated 12 years ago
 - A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
 - Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
 - hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
 - Search bing with python☆12Updated 11 years ago
 - GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
 - A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
 - µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
 - DPE - Default Password Enumeration☆36Updated 12 years ago
 - The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
 - Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
 - ☆15Updated 9 years ago
 - This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 11 years ago
 - Universal LAN-based SSRF Attack Primitive☆19Updated 6 years ago
 - Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago