Ruby based script to perform application scanning of a URL, looking for specific pages to target.
☆25Oct 29, 2014Updated 11 years ago
Alternatives and similar repositories for RubyOSINT
Users that are interested in RubyOSINT are comparing it to the libraries listed below
Sorting:
- ☆12Oct 16, 2017Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Nov 12, 2014Updated 11 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- ☆122Mar 27, 2017Updated 8 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- This repository contains all the talk materials and ebook from the talk System Hardening Using Ansible given at All Day DevOps 2016 onlin…☆12Nov 16, 2016Updated 9 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- Hugo repository for main ironpeak.be website.☆12Feb 17, 2026Updated last week
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Python bindings for Avast antivirus server version for Linux☆15Apr 26, 2014Updated 11 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Script to identify new host using the subjectAltName (Subject Alternate Name) extension of a x509 HTTP TLS certificate.☆12Dec 25, 2020Updated 5 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop…☆16Jan 11, 2017Updated 9 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- JEB Scripts☆21Nov 28, 2014Updated 11 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago