Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product
☆47Jan 4, 2018Updated 8 years ago
Alternatives and similar repositories for Pentest-chainsaw
Users that are interested in Pentest-chainsaw are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Dec 29, 2020Updated 5 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆35Feb 14, 2025Updated last year
- ☆16Mar 4, 2019Updated 7 years ago
- port scanner & login credential tester☆15Mar 25, 2019Updated 7 years ago
- Modified SuperTuxKart to support sending CANBus messages☆12Dec 9, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cross-Site-Scripting (XSS) Automatic Scanner☆44Oct 6, 2020Updated 5 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- HTTPS-based Remote Administration Tool (RAT)☆29Sep 9, 2016Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- Dashboard containing various recon tools☆14Oct 12, 2017Updated 8 years ago
- CVE-2018-7600 Drupal RCE☆114Apr 18, 2018Updated 7 years ago
- Implementation for in-memory patching ida.dll and ida64.dll☆15May 8, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Apr 20, 2021Updated 4 years ago
- CVE-2022-21587 POC☆15Feb 17, 2023Updated 3 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, crede…☆19Aug 8, 2018Updated 7 years ago
- Development Environment Setup For Android using Termux☆13Jul 18, 2022Updated 3 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- visually see issues with supported cipher suites☆18Jun 18, 2024Updated last year
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A curated list of awesome projects, libraries, and tools for MedSec.☆19Mar 22, 2019Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 3 years ago
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- ☆13Jan 27, 2024Updated 2 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Passive subdomains and web directories recon using Bing.☆13Apr 30, 2018Updated 7 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆19Jun 26, 2017Updated 8 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆41Jun 30, 2022Updated 3 years ago
- web information gathering / Grab links☆45Nov 1, 2019Updated 6 years ago
- free exploit framework written use python language version 3.3☆30Mar 31, 2018Updated 7 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago