☆47Sep 3, 2025Updated 5 months ago
Alternatives and similar repositories for scripts-tools-shells
Users that are interested in scripts-tools-shells are comparing it to the libraries listed below
Sorting:
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- TLS SNI virtual hosts bruteforcer☆21Aug 26, 2014Updated 11 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Aug 30, 2016Updated 9 years ago
- ☆24Oct 31, 2023Updated 2 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Jul 4, 2014Updated 11 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- mtr-geoip = mtr + geoip = ping + traceroute + geoip☆10Feb 10, 2017Updated 9 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- ☆15May 3, 2024Updated last year
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- This script allow to scrape shodan.io IoT search engine and get devices IP without using your search or download credit!☆12May 26, 2021Updated 4 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Spring Boot Actuator (jolokia) XXE/RCE☆23Mar 10, 2019Updated 6 years ago
- Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flun…☆28Jan 15, 2017Updated 9 years ago
- A kernel module that dynamically patches the Linux kernel scheduler so as to allow running a custom function upon thread reschedule☆14Feb 6, 2018Updated 8 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 11 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- An extension for Burp's Web Vulnerability Scanner that can detect API discovery metadata and extract data useful during recon.☆19Sep 13, 2025Updated 5 months ago