iSECPartners / dnsRedir
☆39Updated 9 years ago
Alternatives and similar repositories for dnsRedir:
Users that are interested in dnsRedir are comparing it to the libraries listed below
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- ☆15Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- Network white noise collector☆18Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- ☆12Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Format string exploit generation☆10Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Materials from presentation☆20Updated 9 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆30Updated 11 years ago