Custom Deserializer
☆13Feb 1, 2017Updated 9 years ago
Alternatives and similar repositories for CustomDeserializer
Users that are interested in CustomDeserializer are comparing it to the libraries listed below
Sorting:
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Instagram password bruteforcer☆16Jul 24, 2015Updated 10 years ago
- ☆10Aug 8, 2015Updated 10 years ago
- Tool for automation of GUI-based testing.☆16Jan 7, 2015Updated 11 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Growing list of potentially dangerous PHP functions☆52May 1, 2019Updated 6 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Jul 1, 2015Updated 10 years ago
- Testing tools for Oracle Forms☆45May 27, 2023Updated 2 years ago
- pykd script to dynamically find vtables on heap (windows x86/x64)☆25Oct 14, 2014Updated 11 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- @wifi.id Account Extractor & Checker☆24May 24, 2018Updated 7 years ago
- Sample iOS App to test Jailbreak Detection Bypass☆25Nov 1, 2017Updated 8 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Nov 4, 2014Updated 11 years ago
- WStalker: an easy proxy☆25May 5, 2020Updated 5 years ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 7 years ago
- PHP tool to scan ADOdb code for SQL Injections☆31Aug 9, 2016Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- Find the zone of the mobile number using the suffix code☆14Aug 17, 2022Updated 3 years ago
- ZenX Kernel For Redmi K50i / Note 11T Pro(+) / POCO X4 GT Global (xaga)☆10Jul 27, 2024Updated last year
- For accessing info of both public and private instagram accounts☆17Aug 29, 2022Updated 3 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- ☆14Apr 29, 2021Updated 4 years ago
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆140Feb 18, 2021Updated 5 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Apr 13, 2019Updated 6 years ago
- fast cracking tool☆38Jan 7, 2014Updated 12 years ago
- An ike-scan wrapper to simplify penetration testing IKE and encourage stronger IKE implementations.☆40Jun 17, 2024Updated last year
- A tool for netpens.☆37Jun 18, 2019Updated 6 years ago
- To host ProcessMaker v3 Community Editions☆10Jun 18, 2024Updated last year
- ☆15Jul 30, 2022Updated 3 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- The most powerful and fastest DoS Attack Tool☆12Dec 8, 2022Updated 3 years ago
- Constraint solver based on abstract interpretation☆10Dec 20, 2024Updated last year