Script to test for default Knockd configurations to identify hidden remote services |
☆37Sep 9, 2015Updated 10 years ago
Alternatives and similar repositories for knock-knock
Users that are interested in knock-knock are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Jul 18, 2017Updated 8 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- A web app scanner☆24Jan 23, 2014Updated 12 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Jun 22, 2015Updated 10 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆20Jan 9, 2017Updated 9 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Nov 9, 2018Updated 7 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- OfficeBrute - brute force protected word documents☆23Feb 4, 2018Updated 8 years ago
- Leveraging CWMP (CPE WAN Management Protocol) to extract vendor specific secrets and configurations from CPEs☆12Feb 1, 2019Updated 7 years ago
- bypass new soc qualcom☆10Jan 27, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆51Sep 27, 2016Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Python Tool for Host Enumeration