moloch-- / The-Planetary-Assault-System
Fire and forget password cracking and complexity analysis.
☆35Updated 9 years ago
Alternatives and similar repositories for The-Planetary-Assault-System:
Users that are interested in The-Planetary-Assault-System are comparing it to the libraries listed below
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- ☆15Updated 8 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 9 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 7 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- This is a set of scripts that scan a Linux system looking for security and robustness problems.☆17Updated 4 months ago
- Websocket based egress tester☆20Updated 8 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- post-exploitation tools☆15Updated 6 years ago
- Simple multi-stream protocol for use with ZigBee wireless modules. Adds an additional layer of encryption and allows advanced streams suc…☆10Updated 10 years ago
- python based backdoor software☆17Updated 13 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Various pentest scripts☆13Updated 11 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- A collection of shellcodes☆67Updated 12 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Host files with DNS☆32Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated 8 months ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- Popping boxes with Nmap☆18Updated 12 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago