Script to test for default Knockd configurations to identify hidden remote services |
☆37Sep 9, 2015Updated 10 years ago
Alternatives and similar repositories for knock-knock
Users that are interested in knock-knock are comparing it to the libraries listed below
Sorting:
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆21Aug 6, 2017Updated 8 years ago
- A large repository of links spanning all topics in information security.☆13Mar 18, 2016Updated 10 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- A web app scanner☆24Jan 23, 2014Updated 12 years ago
- 基于HoneyPy可视化蜜罐,visualization Honeypot based on HoneyPy☆16Mar 23, 2017Updated 8 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 6 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆20Jan 9, 2017Updated 9 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Nov 9, 2018Updated 7 years ago
- Vulnerabilities which found in Oracle products☆33Apr 17, 2019Updated 6 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago
- bypass new soc qualcom☆10Jan 27, 2021Updated 5 years ago
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆51Sep 27, 2016Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- Python Tool for Host Enumeration☆50Mar 24, 2017Updated 8 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- Common Proprietary Qualcomm Binaries☆10Dec 26, 2016Updated 9 years ago
- I am a simple shell script that downloads all repositories from a user and then hunts them for sh1t.☆11Jul 21, 2022Updated 3 years ago
- Something To Do Android Application Security Research☆10May 14, 2021Updated 4 years ago
- A very loud but fast recon scan and pentest template creator for use in CTF's/OSCP/Hackthebox...☆19May 27, 2021Updated 4 years ago
- This tool is for flashing qualcomm devices.☆10Feb 22, 2021Updated 5 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Bringing Mandatory Access Control to Android apps☆11Dec 20, 2021Updated 4 years ago
- Minimalistic libvte based terminal.☆14Feb 16, 2026Updated last month
- Plugin for keepnote to import a XML nmap file☆27Jul 8, 2016Updated 9 years ago
- 📊 A small tool for displaying the WiFi traffic around you in the terminal.☆18Nov 3, 2019Updated 6 years ago
- A simple personal Telegram bot plugins based.☆14Feb 10, 2016Updated 10 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- The action integrates Electronegativity, a tool to identify misconfigurations and security anti-patterns in Electron applications, into G…☆15Apr 15, 2023Updated 2 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago