lambdacasserole / hack-thisLinks
A collection of common web programming security mistakes.
☆16Updated 6 years ago
Alternatives and similar repositories for hack-this
Users that are interested in hack-this are comparing it to the libraries listed below
Sorting:
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Updated 8 years ago
- wifiDOS with scapy☆16Updated 9 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Updated 9 years ago
- Find your router's default password☆14Updated 10 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- Telegram notification for metasploit sessions.☆13Updated 7 years ago
- Deobfuscated + reverse engineered javascript malware☆30Updated 7 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 5 years ago
- Removed according to regulations☆35Updated 8 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆50Updated 5 years ago
- Simple Tool For Brute Force The Truecrypt Files☆10Updated 11 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆128Updated 12 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Updated 8 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 6 years ago
- CTF Writeups☆16Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆17Updated 10 years ago
- edge --> powerpoint --> remote-file --> shell☆11Updated 6 years ago
- Brute forcer and shell deployer for WildFly☆101Updated 7 years ago
- SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.☆19Updated 6 years ago
- Reverse shell generator☆23Updated 6 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Updated 8 years ago
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆21Updated 8 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Updated 9 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Determine everything you need to know to about a system☆32Updated 7 years ago
- A simple capture the flag framework.☆125Updated 8 years ago
- Some useful tools and scripts☆47Updated 2 years ago
- Hide JavaScript inside your GIF and BMP images☆28Updated 10 years ago
- Random stuff☆16Updated 7 years ago
- yet another dirbuster☆18Updated 5 years ago