mdeous / exploitdb
Shell-style script to search exploit-db.com exploits.
☆59Updated last week
Related projects: ⓘ
- ☆68Updated this week
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆91Updated 4 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 7 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 4 months ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆84Updated 10 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- ☆84Updated this week
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- unix wildcard attacks☆130Updated 6 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆76Updated 7 years ago
- Script to automate, manage, and multithread Nikto scans.☆57Updated 4 years ago
- ☆33Updated this week
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆94Updated last year
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Hacking challenges☆32Updated 6 years ago
- Useful pentesting scripts☆81Updated 7 years ago
- Tool to help identify timing attacks☆68Updated 13 years ago
- ☆51Updated this week
- Automatically performs the SMB relay attack☆71Updated 8 years ago
- A collection of Nmap NSE scripts that I made.☆26Updated 11 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆52Updated 4 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 10 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆91Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 4 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 6 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆59Updated 9 years ago