jm33-m0 / xmirLinks
masscan result parsing, web server fingerprinting
☆18Updated 3 years ago
Alternatives and similar repositories for xmir
Users that are interested in xmir are comparing it to the libraries listed below
Sorting:
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Updated last year
- Docker kinsing malware bitcoin/xmr miner☆23Updated 4 years ago
- pentest toolbox☆28Updated 3 years ago
- Automate Recon process using Shell Scripting☆11Updated 4 years ago
- A tool for recover router password☆32Updated 7 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 6 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Ansible scripts to build an attack box☆24Updated 7 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Python script for privilege escalation for Python☆11Updated 5 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 8 years ago
- The best way to send emails in Go.☆11Updated 4 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- A reverse socks5 proxy server and client☆18Updated 8 years ago
- Port scanning and domain utility.☆30Updated 8 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆30Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Minimalistic DNS logging tool☆44Updated 3 years ago
- Python emulator of msfconsole☆12Updated 5 years ago
- Simple golang reverse shell☆21Updated 5 years ago
- SWF Vulnerability & Information Scanner☆19Updated 7 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 8 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Get tweets and save file in JSON format without Twitter API☆11Updated 6 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago