nasroabd / zynos-attacker
ZynOS tool for automated attack on a range of IPs, find more informations at :
☆74Updated 11 years ago
Alternatives and similar repositories for zynos-attacker:
Users that are interested in zynos-attacker are comparing it to the libraries listed below
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Burp extension that checks for interesting and security headers☆43Updated 4 years ago
- Operational toolset utilizing git's submodule feature☆56Updated 12 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- ☆47Updated 4 years ago
- ☆24Updated 10 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 8 years ago
- ☆63Updated 12 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 9 years ago
- Exploits and research stuffs☆54Updated last year
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Updated 6 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- misc pentest tools.☆26Updated 10 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Source Code Intelligence☆30Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- ☆53Updated 7 years ago
- Metasploit Framework☆26Updated 7 years ago
- Exploits, Fuzzers, Scripts etc☆33Updated 4 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆96Updated 2 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- A proxy server for cookie sidejacking. Works with 'ferret'.☆54Updated 8 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago