Metasploit Logos that use Z for the new zArch additions
☆10Feb 9, 2016Updated 10 years ago
Alternatives and similar repositories for metasploit_logo
Users that are interested in metasploit_logo are comparing it to the libraries listed below
Sorting:
- Database of Internet Facing TN3270 Mainframes☆23Jul 31, 2015Updated 10 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Jun 5, 2017Updated 8 years ago
- z/OS Mainframe TSO Logon panel account enumerator and brute forcer☆32May 24, 2013Updated 12 years ago
- Mainframe Transfer: PROTOCOL☆28Mar 26, 2021Updated 4 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- ☆13Apr 30, 2016Updated 9 years ago
- Command line wrapper, Library, and Rest API for oclHashcat.☆43Jan 19, 2016Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆51Jun 6, 2023Updated 2 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- Files compiled from the Logica breach investigation materials☆45Aug 14, 2018Updated 7 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- Scenes from movies re-imagined as though there were in the terminal☆23Aug 10, 2017Updated 8 years ago
- CATSO/JCL wrapper for z/OS FTP logic attack☆26Feb 18, 2025Updated last year
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Client/server scripts designed to test outbound (egress) firewall rules.☆37Sep 9, 2013Updated 12 years ago
- Custom Metasploit logos☆54Nov 13, 2021Updated 4 years ago
- Collection of Praetorian solutions to CTF challenges☆25Apr 20, 2018Updated 7 years ago
- Documentation for the Corsair protocol (as we understand it)☆27Jun 4, 2020Updated 5 years ago
- Mainframe security auditing and scripts☆141Jul 30, 2018Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- KeyTerms centralized terminology management tool☆13Feb 7, 2019Updated 7 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- Mainframe bruter and screen automation utility.☆43Sep 28, 2014Updated 11 years ago
- Implementation of "Machine Learning Classification over Encrypted Data" by Raphael Bost, Raluca Ada Popa, Stephen Tu and Shafi Goldwasser☆37Oct 12, 2017Updated 8 years ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- Modeling and simulation of ICS devices☆12Jan 28, 2026Updated last month
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago