joernchen / evil_stuff
☆49Updated 7 years ago
Alternatives and similar repositories for evil_stuff
Users that are interested in evil_stuff are comparing it to the libraries listed below
Sorting:
- RoR / Devise PoC in memory Backdoor☆29Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- Various pentest scripts☆13Updated 11 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Proof of Concepts, Exploits☆28Updated last month
- Data exfiltration PoC scripts☆24Updated 9 years ago
- ☆11Updated 9 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 11 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Command line wrapper, Library, and Rest API for oclHashcat.☆42Updated 9 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- Security tools to use on assessments.☆39Updated 9 years ago
- OWASP ZSC API http://api.z3r0d4y.com/v2☆9Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Windows Privesc Check☆20Updated 10 years ago