lambdacasserole / hack-thisLinks
A collection of common web programming security mistakes.
☆16Updated 6 years ago
Alternatives and similar repositories for hack-this
Users that are interested in hack-this are comparing it to the libraries listed below
Sorting:
- wifiDOS with scapy☆16Updated 9 years ago
- Telegram notification for metasploit sessions.☆14Updated 6 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Updated 8 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆53Updated 5 years ago
- Removed according to regulations☆35Updated 8 years ago
- Find your router's default password☆14Updated 10 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- DNS Botnet Server and Client☆35Updated last week
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Python SQL injection framework☆133Updated 3 years ago
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆21Updated 8 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆128Updated 11 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago
- Clone of Metasploit's wiki w/ additions☆16Updated 9 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Updated 8 years ago
- SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.☆19Updated 5 years ago
- Simple, hand-picked list of fuzz strings☆33Updated 8 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 9 months ago
- Simple Tool For Brute Force The Truecrypt Files☆10Updated 11 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆19Updated 4 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- Reverse shell generator☆25Updated 5 years ago
- Proof-of-concept malware programs. For educational purpose only.☆24Updated 8 years ago