This is the repo for the exercise project to be developed in Shanghai team's Modern Web Development course
☆21Jun 9, 2018Updated 7 years ago
Alternatives and similar repositories for bbuddy
Users that are interested in bbuddy are comparing it to the libraries listed below
Sorting:
- Hacking the HooToo HT-TM05☆12Dec 22, 2022Updated 3 years ago
- Maltego transforms for the Steam community☆12Aug 5, 2017Updated 8 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- F5 BIG-IP unauthenticated remote code execution (RCE) and authentication bypass vulnerability!☆11Oct 30, 2023Updated 2 years ago
- ☆16Aug 26, 2017Updated 8 years ago
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- 🎮 AI-powered solo mode for Backdoors & Breaches. Train incident response skills anytime with an LLM Incident Master. Arcade-themed fork …☆28Dec 27, 2025Updated 2 months ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Integrated tool for extracting scripts and binaries of AutoIt, AutoHotKey, InnoSetup, NSIS executables and Decoding powershell / jse / vb…☆14Dec 10, 2018Updated 7 years ago
- A silly little transpiler/assembler for SHENZHEN I/O, a rad programming game by Zachtronics.☆16Apr 22, 2018Updated 7 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- Create Password lists for cracking lyrical passwords☆17May 11, 2024Updated last year
- Mirror of http://rafale.org/~mattoufoutu/darkc0de.com☆13Jul 25, 2015Updated 10 years ago
- Automation for GoPhish internal phishing campaigns.☆20Jan 24, 2022Updated 4 years ago
- ☆18Jul 9, 2020Updated 5 years ago
- An addon to import users from active directory to gophish☆19Mar 22, 2022Updated 3 years ago
- Collections of past presentation slides☆15Feb 18, 2022Updated 4 years ago
- Ethical Hacking techniques☆26Mar 30, 2025Updated 11 months ago
- Utility to copy templates, pages, and sending profiles between different Gophish accounts☆19Oct 28, 2020Updated 5 years ago
- Github profile☆21Feb 2, 2026Updated last month
- Advanced web server fingerprinting☆22Sep 27, 2017Updated 8 years ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- Intentionally vulnerable Ruby on Rails web application for learning purposes☆17Sep 11, 2009Updated 16 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 2 months ago
- Blind SQL Injection (BSQLI) Data Exploration Tool☆18Feb 18, 2017Updated 9 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- ☆19Apr 27, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆16Jan 8, 2019Updated 7 years ago
- Tunnel IP over ICMP.☆16Jul 13, 2016Updated 9 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆19Jun 2, 2023Updated 2 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆27Jan 18, 2023Updated 3 years ago
- Maltego transform for visualizing Nessus scan data☆45Dec 11, 2019Updated 6 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- Python script that decodes inject.bin files for the hak5 USB rubber Duck.☆24May 17, 2015Updated 10 years ago
- Python module for sniffing 802.15.4 with TI CC2531EMK USB module☆26Jun 30, 2021Updated 4 years ago
- WSDL Parser extension for Burp☆20Feb 13, 2017Updated 9 years ago
- ☆21Apr 24, 2023Updated 2 years ago