nccgroup / vbruteLinks
Virtual host brute forcer
☆22Updated 11 years ago
Alternatives and similar repositories for vbrute
Users that are interested in vbrute are comparing it to the libraries listed below
Sorting:
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- Application Security Vulnerability Periodic Table☆14Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆29Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18Updated 5 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 5 months ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Universal stack-based buffer overfow exploitation tool☆23Updated 11 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Ruby Oracle Security Scanner☆16Updated 13 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Updated 13 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 7 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 12 years ago
- Evil snippets of Underhanded Red Team tactics☆11Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago