nccgroup / UPnP-Pentest-ToolkitView external linksLinks
UPnP Pentest Toolkit for Windows
☆261Nov 13, 2014Updated 11 years ago
Alternatives and similar repositories for UPnP-Pentest-Toolkit
Users that are interested in UPnP-Pentest-Toolkit are comparing it to the libraries listed below
Sorting:
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆226Dec 29, 2015Updated 10 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Aug 30, 2016Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Easy Window domain access☆51Apr 3, 2014Updated 11 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- A Upnp exploitation tool.☆106Oct 27, 2019Updated 6 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 9 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 10 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Specify targets and run sets of tools against them☆386Apr 23, 2019Updated 6 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Apr 28, 2022Updated 3 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Dec 9, 2017Updated 8 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Nov 6, 2013Updated 12 years ago
- The USB host security assessment tool☆285Nov 28, 2018Updated 7 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆328Apr 23, 2023Updated 2 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- application server attack toolkit☆688Apr 6, 2020Updated 5 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 9 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Jan 30, 2018Updated 8 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Jun 30, 2018Updated 7 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆285Aug 8, 2021Updated 4 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- A GUI-based USB device fuzzer☆64Oct 12, 2017Updated 8 years ago
- A python script for obfuscating wireless networks☆79Nov 14, 2016Updated 9 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago