joernchen / evil_stuffLinks
☆49Updated 8 years ago
Alternatives and similar repositories for evil_stuff
Users that are interested in evil_stuff are comparing it to the libraries listed below
Sorting:
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Command line wrapper, Library, and Rest API for oclHashcat.☆43Updated 9 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- RoR / Devise PoC in memory Backdoor☆29Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- Parse HTTP Security Headers☆40Updated last year
- Write Up I write for different CTFs☆12Updated 7 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆29Updated 8 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- Exploits and research stuffs☆56Updated 2 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- Security tools to use on assessments.☆39Updated 9 years ago
- A shellcode testing harness.☆70Updated last year
- ☆10Updated 9 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 12 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆34Updated 12 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Updated 13 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Proof of Concepts, Exploits☆28Updated 5 months ago
- Phishing Toolkit☆20Updated 7 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Updated 11 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago