Minion
☆354Mar 28, 2019Updated 6 years ago
Alternatives and similar repositories for minion
Users that are interested in minion are comparing it to the libraries listed below
Sorting:
- INACTIVE - http://mzl.la/ghe-archive - Minion Backend☆40Mar 28, 2019Updated 6 years ago
- Minion Frontend☆30Mar 28, 2019Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Mar 29, 2019Updated 6 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- ☆129Jul 17, 2015Updated 10 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Nov 30, 2018Updated 7 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Jun 3, 2015Updated 10 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆142Aug 31, 2021Updated 4 years ago
- Mittn: Security test tool runner for test automation in CI☆196Jan 2, 2024Updated 2 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆599Feb 12, 2022Updated 4 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆864Feb 12, 2026Updated 2 weeks ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆739Mar 18, 2024Updated last year
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Gryffin is a large scale web security scanning platform.☆2,060Feb 12, 2021Updated 5 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Community rules for Commit Watcher☆24Jun 9, 2016Updated 9 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆19Aug 18, 2023Updated 2 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- PEDAL - Python Exploit Development Assistance for GDB Lite☆33Oct 27, 2019Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Collect chrome extensions from various devices and find out if they are malicious☆24Jan 17, 2026Updated last month
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Jun 23, 2016Updated 9 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Jun 25, 2024Updated last year
- OWSAP Damn Vulnerable Web Sockets (DVWS) is a vulnerable web application which works on web sockets for client-server communication.☆354Dec 19, 2025Updated 2 months ago