Things I've coded, or use (cause I can't find them online anymore)
☆32May 25, 2012Updated 13 years ago
Alternatives and similar repositories for stuff
Users that are interested in stuff are comparing it to the libraries listed below
Sorting:
- Random Code☆25Apr 18, 2011Updated 14 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Feb 11, 2012Updated 14 years ago
- Wordpress Plugins Scanner it's a semi-automatic white box pentesting/crawler app for WP plugins using RIPS from OWASP.☆14Aug 6, 2013Updated 12 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- ☆13May 28, 2013Updated 12 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- ☆26Jun 20, 2018Updated 7 years ago
- A way to force your wifi-pineapple to use SSL☆14Jul 26, 2017Updated 8 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 2 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Feb 8, 2023Updated 3 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.☆58May 1, 2015Updated 10 years ago
- This is where we work on the newsletter☆28Dec 2, 2017Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆37Jan 30, 2023Updated 3 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Jun 15, 2017Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Our learnings about using data and technology for social change☆18Mar 19, 2024Updated last year
- Simple proxy designed to intercept and modify connections on the transport level. This means you can also modify TLS raw bytes.☆17Dec 13, 2021Updated 4 years ago
- Tutorial for Node.js security☆21Sep 4, 2020Updated 5 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- GNU/Linux version of the https://github.com/inquisb/icmpsh slave☆22Feb 11, 2020Updated 6 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- security in a box - tools and tactics for your digital security☆20May 4, 2015Updated 10 years ago