nicolas-carolo / hsploitLinks
An advanced command-line search engine for Exploit-DB
☆16Updated 3 years ago
Alternatives and similar repositories for hsploit
Users that are interested in hsploit are comparing it to the libraries listed below
Sorting:
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Interactive Post Exploitation Tool☆37Updated 5 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 6 years ago
- Modern problems require modern solutions☆30Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- python scripts for penetration testing☆11Updated 5 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- pentest scripts☆21Updated 4 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 8 years ago
- Automated Tools Pentest☆7Updated 2 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Simple Karma Attack☆69Updated 4 years ago
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 5 years ago
- Open Standard Vulnerability & Compliance Scanner☆44Updated 9 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆31Updated this week
- A simple python reverse shell written just for fun.☆65Updated 2 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆72Updated last year
- A collection of curated Java Deserialization Exploits☆10Updated 7 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 4 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Shodan Port Scanner☆43Updated 4 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago