lambdacasserole / hack-thisLinks
A collection of common web programming security mistakes.
☆16Updated 6 years ago
Alternatives and similar repositories for hack-this
Users that are interested in hack-this are comparing it to the libraries listed below
Sorting:
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Updated 8 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆53Updated 5 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 5 years ago
- Telegram notification for metasploit sessions.☆14Updated 6 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- Malware analysis tool☆22Updated 5 months ago
- Reverse shell generator☆25Updated 6 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- DNS Botnet Server and Client☆34Updated last month
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆128Updated 12 years ago
- wifiDOS with scapy☆16Updated 9 years ago
- Deobfuscated + reverse engineered javascript malware☆30Updated 7 years ago
- A reverse shell cheat-sheet tool☆39Updated 6 years ago
- Clone of Metasploit's wiki w/ additions☆17Updated 9 years ago
- A tool to generate email addresses from LinkedIn using google dorking.☆46Updated 7 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆19Updated 4 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆34Updated 12 years ago
- This repo is all about myself coded exploit codes :)☆54Updated 6 years ago
- ☆23Updated 7 years ago
- Removed according to regulations☆35Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 10 months ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago