lanjelot / albatarView external linksLinks
Albatar is a SQLi exploitation framework in Python
☆137Jan 24, 2025Updated last year
Alternatives and similar repositories for albatar
Users that are interested in albatar are comparing it to the libraries listed below
Sorting:
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Feb 2, 2021Updated 5 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Prometheus Firewall Analyzer☆48May 1, 2015Updated 10 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 11 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- ☆58Nov 27, 2014Updated 11 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 9 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 7 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- ☆18Dec 16, 2023Updated 2 years ago
- A GUI-based USB device fuzzer☆64Oct 12, 2017Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- Specify targets and run sets of tools against them☆386Apr 23, 2019Updated 6 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Apr 10, 2022Updated 3 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Jun 22, 2012Updated 13 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- A python script for obfuscating wireless networks☆79Nov 14, 2016Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago