joernchen / evil_stuffLinks
☆49Updated 7 years ago
Alternatives and similar repositories for evil_stuff
Users that are interested in evil_stuff are comparing it to the libraries listed below
Sorting:
- RoR / Devise PoC in memory Backdoor☆29Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 10 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Updated 12 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- OWASP ZSC API http://api.z3r0d4y.com/v2☆9Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 11 years ago
- Proof of Concepts, Exploits☆28Updated 3 months ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- A shellcode testing harness.☆69Updated last year
- Command line wrapper, Library, and Rest API for oclHashcat.☆42Updated 9 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- ☆15Updated 8 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- Exploit Reliability Testing System☆34Updated 10 years ago
- Security tools to use on assessments.☆39Updated 9 years ago
- A simple python script to dump data from memcached servers.☆11Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago