lillypad / chrome-crusader
Chrome Crusader
☆24Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for chrome-crusader
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 3 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆35Updated 4 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Updated 6 years ago
- AV Bypass☆28Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆17Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆53Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆22Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 6 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 5 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 9 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- Tool to identify all domains contained in an IP anonymously☆15Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago