☆11Aug 11, 2014Updated 11 years ago
Alternatives and similar repositories for ZigTools
Users that are interested in ZigTools are comparing it to the libraries listed below
Sorting:
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Jul 2, 2021Updated 4 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- A simple Nessus results viewer☆49Aug 30, 2013Updated 12 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- Binarly SDK v1☆14Dec 18, 2016Updated 9 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago
- A lightweight wireless sensor library for Arduino☆83Feb 17, 2025Updated last year
- note without the e(vernote), the quickest dirtiest cli evernote client ever☆10Apr 30, 2016Updated 9 years ago
- pwsafe v3 implementation in golang☆14Mar 14, 2026Updated last week
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Aug 9, 2013Updated 12 years ago
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- random RE stuff☆21May 11, 2012Updated 13 years ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 9 years ago
- Golang package for accessing and manipulating the Mac OS X Keychain☆37Mar 1, 2018Updated 8 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- Oracle Database 12c password brute forcer☆29Jun 18, 2015Updated 10 years ago
- The ARP Scanner☆11Apr 19, 2014Updated 11 years ago
- OG Atomic Red Team☆30Jun 12, 2018Updated 7 years ago
- example using mosquitto MQTT client library☆15Sep 17, 2017Updated 8 years ago
- Simple Tool For Brute Force The Truecrypt Files☆10Mar 29, 2014Updated 11 years ago
- ☆17Apr 22, 2019Updated 6 years ago
- Containerized IDA Pro (Windows/Wine), DEPRECIATED, please use https://github.com/NyaMisty/docker-wine-ida☆26Nov 23, 2017Updated 8 years ago
- Corewar project fully written in x86 Assembly - NASM - Linux☆20Jan 19, 2016Updated 10 years ago
- A set of bash scripts for offensive security pentesting. (Machine with Kali reccomended)☆13Sep 30, 2016Updated 9 years ago
- ☆17Jul 8, 2021Updated 4 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- An open-source algorithmic trading platform written in Python☆22Updated this week
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- Scripts for Kali Linux☆17May 25, 2017Updated 8 years ago