iSECPartners / yontma
You'll never take me alive.
☆87Updated 10 years ago
Alternatives and similar repositories for yontma:
Users that are interested in yontma are comparing it to the libraries listed below
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- ☆15Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- Chrome extension for blocking x-origin cookies☆10Updated 8 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- ☆12Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- ☆21Updated 10 years ago
- Network white noise collector☆18Updated 8 years ago
- recon framework in ruby☆13Updated 13 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 8 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆18Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- A List of InfoSec Resources☆10Updated 10 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆29Updated 8 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago