mschwager / 0wnedLinks
Code execution via Python package installation.
☆170Updated 6 years ago
Alternatives and similar repositories for 0wned
Users that are interested in 0wned are comparing it to the libraries listed below
Sorting:
- A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.☆158Updated 4 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- An information gathering tool to collect git commit emails in version control host services☆154Updated 6 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Small Python library that makes it easy to exploit race conditions in web apps with Requests.☆160Updated 2 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 10 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- ☆122Updated 7 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated 2 years ago
- port of mimipenguin.sh in python with some additional protection features☆208Updated 8 years ago
- Resources for developers and security engineers to learn the ropes of application security☆97Updated 6 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- ☆9Updated 7 years ago
- Some scripts and exploits☆146Updated 6 years ago
- CVE-2018-10933 very simple POC☆128Updated 6 years ago
- a fully python Diffie-Hellman Library☆51Updated 7 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆141Updated 7 years ago
- unix wildcard attacks☆133Updated 7 years ago
- Improved decoder for Burp Suite☆137Updated 3 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- An SSRF-preventing wrapper around Python's requests library. Advocate is no longer maintained, please fork and rename if you would like t…☆93Updated last year
- Small CTF challenges running on Docker☆159Updated 6 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- Cryptovenom: The Cryptography Swiss Army Knife☆1Updated 4 years ago
- Fast subdomains enumeration tool for penetration testers☆117Updated 6 years ago