☆19Jun 8, 2017Updated 8 years ago
Alternatives and similar repositories for Advance-Nmap-Scan-with-Msf-Scan-Fixed
Users that are interested in Advance-Nmap-Scan-with-Msf-Scan-Fixed are comparing it to the libraries listed below
Sorting:
- A description on how to setup a Qomputor Node or Miner Node☆15Aug 24, 2023Updated 2 years ago
- Automatically extracts API Keys from APK files☆13Feb 1, 2022Updated 4 years ago
- Find infected ms17-010 machines☆14May 26, 2017Updated 8 years ago
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Sep 6, 2024Updated last year
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Apr 29, 2017Updated 8 years ago
- govenom is a msfvenom-inspired cross-platform payload generator toolkit written in Go☆21Sep 9, 2020Updated 5 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Oct 1, 2024Updated last year
- A BurpSuite extension for vulnerability Scanning☆29Feb 16, 2024Updated 2 years ago
- Some Malduino ducky scripts☆26May 22, 2017Updated 8 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Auto Root Exploit Tool☆536Jun 15, 2023Updated 2 years ago
- Autosploit = Automating Metasploit Modules.☆77Jul 14, 2019Updated 6 years ago
- 一款支持检测web应用程序未授权访问缺陷的burp suite插件,可自定义配置检测字段以及返回包json数据分析☆12Apr 22, 2024Updated last year
- ☆11Aug 31, 2019Updated 6 years ago
- Brutal SSH: SSH Login brute force, scan for vulnerable version and 0 day exploit (under development)☆84Apr 4, 2023Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- Inject scripted keystrokes and mouse movements into remote desktop sessions, including VMware View, Amazon Workspaces, and Microsoft RDP.…☆16Jul 25, 2014Updated 11 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 2 years ago
- XELIS documentation website☆11Feb 26, 2026Updated last week
- GNTL Project Documentation☆11Apr 9, 2021Updated 4 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- 🔑 WinPass11 WinService is a tool for loading keys into the registry on startup with the use of Windows Services.☆13Jun 29, 2021Updated 4 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- Material design file manager for Android☆10Jul 4, 2018Updated 7 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- Man in the middle attack demo☆11Jan 14, 2018Updated 8 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆34Apr 24, 2018Updated 7 years ago
- A script to install the metasploit-framework automatically or without hassle and errors.☆39Nov 6, 2017Updated 8 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago