Things I've coded, or use (cause I can't find them online anymore)
☆32May 25, 2012Updated 13 years ago
Alternatives and similar repositories for stuff
Users that are interested in stuff are comparing it to the libraries listed below
Sorting:
- Random Code☆25Apr 18, 2011Updated 14 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Feb 11, 2012Updated 14 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.☆58May 1, 2015Updated 10 years ago
- Wordpress Plugins Scanner it's a semi-automatic white box pentesting/crawler app for WP plugins using RIPS from OWASP.☆14Aug 6, 2013Updated 12 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- A fuzz demo for windows driver based on IoControlCode☆12May 25, 2018Updated 7 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Jan 31, 2019Updated 7 years ago
- Metasploit modules that didn't make it into trunk for some reason or the other☆118Jun 17, 2017Updated 8 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- Provides String#to_regexp☆28Jun 14, 2020Updated 5 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- ☆13May 28, 2013Updated 12 years ago
- Ruby interface to cirt.net default passwords database☆19May 4, 2011Updated 14 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- Write simple security regression tests for your network infrastructure.☆19Jul 4, 2012Updated 13 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 9 months ago
- This is where we work on the newsletter☆28Dec 2, 2017Updated 8 years ago
- ☆60Jun 16, 2011Updated 14 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- ☆37May 21, 2014Updated 11 years ago
- ☆26Jun 20, 2018Updated 7 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Apr 23, 2018Updated 7 years ago
- Method for storing and unsealing Hashicorp Vault using Ansible and Mac Keychain☆14Nov 29, 2017Updated 8 years ago
- A tool to catch spoofed NBNS responses.☆51Jun 13, 2018Updated 7 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- Volatility plugins☆12Feb 19, 2015Updated 11 years ago
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- A collection of tools mostly written in Python.☆15Feb 4, 2015Updated 11 years ago