A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an application.
☆30May 6, 2016Updated 9 years ago
Alternatives and similar repositories for scenester
Users that are interested in scenester are comparing it to the libraries listed below
Sorting:
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- Easy Window domain access☆51Apr 3, 2014Updated 11 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- ☆13Jun 11, 2014Updated 11 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Jul 12, 2016Updated 9 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- Scan networks for SSH servers with default username and password☆12Oct 24, 2015Updated 10 years ago
- UPnP Pentest Toolkit for Windows☆261Nov 13, 2014Updated 11 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Rule-creation tool for CiscoRouter Scanner☆16Dec 17, 2014Updated 11 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Nov 6, 2013Updated 12 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Aug 30, 2016Updated 9 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- NCC Group Open Source RF Security Testing Methodology☆90Apr 28, 2022Updated 3 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- ☆38May 31, 2017Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆17Sep 28, 2015Updated 10 years ago
- Python script to scan for weak CBC ciphers, weak MAC algorithms and support auth methods.☆17Apr 13, 2016Updated 9 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago