jbremer / jsunpck
Javascript Unpacker and Simplifier
☆41Updated 6 years ago
Related projects: ⓘ
- ☆11Updated this week
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Updated 4 years ago
- A python script for obfuscating wireless networks☆74Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆29Updated 7 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 9 years ago
- cross-platform sqlmap GUI aimed to mobile devices☆47Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆45Updated 8 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Download exploits from exploit-db.com☆43Updated 9 years ago
- Simple php backdoor based on extension☆22Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 7 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 9 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- ☆15Updated 7 years ago
- ☆22Updated this week
- ☆14Updated this week
- ☆12Updated 7 years ago
- ☆28Updated 8 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 6 years ago
- Format string exploit generation☆9Updated 9 years ago
- ☆26Updated 7 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆38Updated 6 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Cross Distribution Exploit Testing☆27Updated 8 years ago
- a javascript keylogger included in a gif file☆38Updated 11 years ago
- Swiss Army knife for raw bytes manipulation & interception☆54Updated last year