jkingsman / Breakbot
Quickly add disruptive unicode, dangerous strings, and more to your clipboard.
☆25Updated 8 years ago
Alternatives and similar repositories for Breakbot:
Users that are interested in Breakbot are comparing it to the libraries listed below
- Websocket based egress tester☆20Updated 8 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆47Updated 9 years ago
- ☆27Updated 7 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Updated 9 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆77Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- A regex based source code scanner.☆129Updated 7 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆158Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- ☆53Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Store Burp data and collaborate via git☆54Updated 5 years ago
- ☆45Updated 7 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 7 years ago
- Scripts that aren't PowerShell☆48Updated 5 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆242Updated 10 years ago
- Collection of metasploit modules☆66Updated 7 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 8 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago