jivoi / exploits_devLinks
only for 31337
☆23Updated 8 years ago
Alternatives and similar repositories for exploits_dev
Users that are interested in exploits_dev are comparing it to the libraries listed below
Sorting:
- buffer overflow examples☆22Updated 7 years ago
- ☆15Updated 2 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- A collection of Nmap NSE scripts that I made.☆28Updated 12 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20Updated 10 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Unofficial WhatCMS API package☆41Updated 4 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- Bypass XSS Reflected Cross-site scripting☆32Updated 10 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- ☆21Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated 10 months ago
- DNS Enumeration with Asynchronicity☆45Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Shodanwave - Netwave IP Camera☆18Updated 7 years ago
- scripts for pentesting☆88Updated 7 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago