leechristensen / GolangSocks5ServerView external linksLinks
A simple SOCKS5 server written in Go
☆31Nov 7, 2016Updated 9 years ago
Alternatives and similar repositories for GolangSocks5Server
Users that are interested in GolangSocks5Server are comparing it to the libraries listed below
Sorting:
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Jul 4, 2014Updated 11 years ago
- ☆17May 7, 2025Updated 9 months ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated 2 weeks ago
- Tools for encrypting and decrypting things using Cisco's type 7 encryption.☆15Jan 11, 2013Updated 13 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- ☆51Jul 8, 2025Updated 7 months ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 14 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Aug 29, 2012Updated 13 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Automated WiFi limit evasion☆119Jan 26, 2017Updated 9 years ago
- Quick scan to find live hosts on the network/across networks☆48Jul 4, 2014Updated 11 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆77Jul 3, 2018Updated 7 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- WPS scan and pwn tool☆70Nov 12, 2019Updated 6 years ago
- SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities.☆72Jan 21, 2020Updated 6 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- ☆49Mar 31, 2016Updated 9 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- ☆15May 3, 2024Updated last year
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flun…☆28Jan 15, 2017Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Kojoney2 is a low interaction SSH honeypot written in Python. Based on Kojoney by Jose Antonio Coret☆39Jan 6, 2015Updated 11 years ago