ZynOS tool for automated attack on a range of IPs, find more informations at :
☆74Mar 12, 2014Updated 12 years ago
Alternatives and similar repositories for zynos-attacker
Users that are interested in zynos-attacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- English translation of @vulhub - Docker-Compose files for creating vulnerable environments. THIS PROJECT HAS BEEN ADDED WITH THE OFFICAL …☆11Sep 5, 2018Updated 7 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- ☆24Mar 8, 2017Updated 9 years ago
- ☆12Oct 29, 2015Updated 10 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- Arduino (Teensy) Based HID Attacks with Metasploit Modules☆12Feb 18, 2018Updated 8 years ago
- Very simple runtime hooking library for OS X.☆15Aug 9, 2015Updated 10 years ago
- ☆18Feb 4, 2016Updated 10 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- scrapin' proxies with ocr☆19Jun 19, 2018Updated 7 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 11 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Mar 5, 2014Updated 12 years ago
- A scriptable debugger library to interact with Android applications☆46Sep 27, 2013Updated 12 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- A network addresses analyzer for Elasticsearch☆13Mar 24, 2018Updated 8 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆16Jul 6, 2014Updated 11 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 10 years ago
- Faraday Continuous Scanning☆34Sep 29, 2016Updated 9 years ago
- Cracking Passwords with Neural Networks☆10Nov 18, 2020Updated 5 years ago
- Plugins for the Volatility framework☆18Oct 30, 2015Updated 10 years ago
- Build a search engine from nmap XML files☆20Aug 19, 2014Updated 11 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆21Mar 21, 2017Updated 9 years ago
- POC of sudo password stealer☆36Feb 10, 2021Updated 5 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A client to facilitate simple RESTful requests☆18Sep 7, 2010Updated 15 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- CVE 2017-9805☆60Aug 31, 2020Updated 5 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- Add a little WebOS to iOS!☆18Aug 17, 2015Updated 10 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago