Some easy network attack examples.
☆34Jul 5, 2016Updated 9 years ago
Alternatives and similar repositories for Attack
Users that are interested in Attack are comparing it to the libraries listed below
Sorting:
- 超精简的POC扫描框架☆10Aug 5, 2019Updated 6 years ago
- hacks instagram, facebook,sms attack,other options yet tot come out!☆17Jul 12, 2018Updated 7 years ago
- ☆26May 22, 2023Updated 2 years ago
- Ansible configurations for distributed MultiScanner installations☆14Apr 11, 2019Updated 6 years ago
- USB Attack Development Platform☆34May 19, 2018Updated 7 years ago
- A collection of scripts and tools I have authored to aid in Pentesting, provided under GNUv3, NOTE: I am not liable if you use them for i…☆34Oct 23, 2018Updated 7 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- A collection of web pages, vulnerable to command injection flaws☆182Mar 5, 2023Updated 3 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago
- ZynOS tool for automated attack on a range of IPs, find more informations at :☆74Mar 12, 2014Updated 12 years ago
- Python SQL injection framework☆133Nov 8, 2021Updated 4 years ago
- Script to help enumerate and dig through Github and Github Enterprise installations.☆15Nov 30, 2018Updated 7 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 7 months ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Feb 15, 2017Updated 9 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- 《C++反汇编与逆向分析技术揭秘》学习笔记☆12Jun 10, 2018Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Demo iPhone app for the HiJack device☆35Aug 21, 2011Updated 14 years ago
- Sise supplicant exploit kit -- 华软蝴蝶漏洞利用工具包..☆14Mar 11, 2016Updated 10 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- .NET ASP.NET Security Analyser - Consolidation of multiple ASP.NET OWASP tools☆15Apr 25, 2015Updated 10 years ago
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year or…☆19Jun 20, 2021Updated 4 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- OS X rootkit loader version #2☆12Apr 9, 2015Updated 10 years ago
- System Security Project☆13Feb 28, 2017Updated 9 years ago
- Simple poc of CVE-2018-8414 Windows Package Setting RCE Vulnerability☆22Sep 21, 2020Updated 5 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Jun 23, 2019Updated 6 years ago
- SQLi Tool/SQL Injection/Hijacker☆46Dec 10, 2016Updated 9 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Oct 20, 2018Updated 7 years ago