pete911 / zip-bombLinks
scripts to create zip bombs
☆12Updated 12 years ago
Alternatives and similar repositories for zip-bomb
Users that are interested in zip-bomb are comparing it to the libraries listed below
Sorting:
- ☆15Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- XSS payload designed to steal LastPass users' credentials☆16Updated 11 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- Exploit Dev Wiki☆13Updated 11 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 5 years ago
- Infecting PE☆24Updated 11 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 12 years ago
- A Tool for Impersonating CAPTCHA Providers☆17Updated 13 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 9 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Updated 10 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Wireless discovery and exploitation framework written in Python☆18Updated 14 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- A python script for obfuscating wireless networks☆78Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- ☆28Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago