mindcrypt / uriDeepLinks
Unicode encoding attacks with machine learning
☆98Updated 4 years ago
Alternatives and similar repositories for uriDeep
Users that are interested in uriDeep are comparing it to the libraries listed below
Sorting:
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- ☆46Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Offensive Security recon tool☆91Updated 4 years ago
- Unique wordlist generator of unique wordlists.☆41Updated 2 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 5 months ago
- ☆30Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Words list generator to crack security tokens☆111Updated 5 years ago
- A tool written in python for scraping firebase data☆44Updated 5 years ago
- Another Subdomain ENumeration Tool☆13Updated 3 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 5 years ago
- Collaborative pentest tool with highly customizable tools☆73Updated 4 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- automated password spraying tool☆147Updated 4 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- Various scripts and codes☆84Updated 4 years ago
- Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.☆67Updated 4 years ago
- Automate Metasploit scanning and exploitation☆116Updated 5 months ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 4 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 3 years ago
- ☆54Updated 4 years ago