Generate customized and undetectable exploits for Metasploit.
☆22Jul 10, 2017Updated 8 years ago
Alternatives and similar repositories for Mermaid
Users that are interested in Mermaid are comparing it to the libraries listed below
Sorting:
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- ☆18Aug 15, 2025Updated 6 months ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Jun 14, 2017Updated 8 years ago
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- ☆11May 19, 2017Updated 8 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50May 15, 2018Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆19Apr 20, 2016Updated 9 years ago
- A collection of hashcat-hcstat files☆33Feb 13, 2018Updated 8 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Open-source advanced cracking tool made in Electron.JS☆19Jul 7, 2020Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 6 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- It is a Python+Perl script to exploit ASP.net Padding Oracle vulnerability.☆18Aug 2, 2016Updated 9 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 8 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆126Sep 19, 2017Updated 8 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Mar 27, 2020Updated 5 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago