lockfale / SPIZZLE
SPIZZLE, The Onion Spider.
☆13Updated 7 years ago
Alternatives and similar repositories for SPIZZLE:
Users that are interested in SPIZZLE are comparing it to the libraries listed below
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆13Updated 2 years ago
- Automation Hacking & Penetration Testing Suite☆10Updated 8 years ago
- Tutorials for getting started with Pwntools☆12Updated 2 years ago
- Automated Mass Exploiter☆12Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- ☆20Updated 11 years ago
- pen testing scripts☆11Updated 4 years ago
- MS17-010☆12Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Python tool for Dorking☆11Updated last year
- Vulnerability Scanner☆11Updated 10 years ago
- PHP tool to grab urls of a specific site.☆9Updated 6 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 10 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- The LAZY script will make your life easier, and of course faster.☆9Updated 7 years ago
- Various exploits☆10Updated 8 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Updated 6 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 9 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- Search bing with python☆12Updated 10 years ago
- Software exploitation training material☆15Updated 7 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago