ikotler / hackershLinks
A free and open source command-line shell and scripting language designed especially for security testing
☆127Updated 11 years ago
Alternatives and similar repositories for hackersh
Users that are interested in hackersh are comparing it to the libraries listed below
Sorting:
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 8 years ago
- Security tools to use on assessments.☆39Updated 9 years ago
- Parses Nmap XML files☆25Updated 10 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 8 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Unix remote login tool, rootkit shell tool☆34Updated 10 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- ☆47Updated 9 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- Projects and POCs☆60Updated 11 years ago
- ☆22Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- misc pentest tools.☆26Updated 10 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- A python based https remote access trojan for penetration testing☆84Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Exploits and research stuffs☆55Updated last year
- ☆20Updated last year
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Download exploits from exploit-db.com☆43Updated 10 years ago
- Clone of Metasploit's wiki w/ additions☆16Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago