pete911 / zip-bombLinks
scripts to create zip bombs
☆12Updated 12 years ago
Alternatives and similar repositories for zip-bomb
Users that are interested in zip-bomb are comparing it to the libraries listed below
Sorting:
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 12 years ago
- ☆15Updated 11 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- XSS payload designed to steal LastPass users' credentials☆16Updated 11 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Updated 9 years ago
- Wireless discovery and exploitation framework written in Python☆18Updated 14 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- Infecting PE☆24Updated 11 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Optional plugins for MITMf☆16Updated 10 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Updated 13 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Exploit Dev Wiki☆13Updated 11 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 12 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆29Updated 8 years ago
- Multi source CVE/exploit parser.☆28Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago