mich01 / SpiderSMSLinks
An End to End Encrypted SMS and SMS Tunneling app
☆40Updated 2 years ago
Alternatives and similar repositories for SpiderSMS
Users that are interested in SpiderSMS are comparing it to the libraries listed below
Sorting:
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 6 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆17Updated 3 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- FuzzSSH is a free software tool created to detect SSH (protocol) vulnerabilities.☆16Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 4 months ago
- A number of exploits and tools I've written for CVEs accredited to Marshall Whittaker/oxagast☆7Updated last month
- ShellC0de Generator☆11Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆27Updated 9 months ago
- ☆14Updated 3 years ago
- 「🚪」The hidden hookless backdoor☆12Updated 6 months ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Updated last year
- ☆28Updated last year
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- ☆12Updated 4 years ago
- Ransomware for demonstration☆17Updated 2 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆24Updated 10 months ago
- masscan with exclusive excludes☆56Updated last year
- Emulate the handshake packets of an RDP server with python☆15Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago