picatz / iptablezLinks
š¦ A friendly Ruby API to iptables.
ā15Updated 8 years ago
Alternatives and similar repositories for iptablez
Users that are interested in iptablez are comparing it to the libraries listed below
Sorting:
- Parse HTTP Security Headersā40Updated last year
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.ā58Updated 10 years ago
- A Jenkins Pentest/Security Toolkit written in Pythonā15Updated 8 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.ā11Updated 8 years ago
- Metasploit exploit suggester using OpenVAS XML outputā18Updated 7 years ago
- NMAP NSE that enumerates VNC authentication typesā14Updated 15 years ago
- Ruby library for SHODANā75Updated 6 years ago
- Rex provides a variety of classes useful for security testing and exploit development.ā51Updated 2 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Scriptā13Updated 12 years ago
- RoR / Devise PoC in memory Backdoorā29Updated 11 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.ā72Updated 6 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.ā25Updated 11 years ago
- Bash scripts to help setup port redirects with iptablesā16Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Toolā31Updated 10 years ago
- Ruby Bind and Reverse Shells I wrote using standard libs. Bind Shell includes authentication while reverse does not. Standard libs only sā¦ā12Updated 12 years ago
- Command line wrapper, Library, and Rest API for oclHashcat.ā43Updated 9 years ago
- Reverser - A Quick Reverse Connection Deployment Scriptā12Updated 13 years ago
- Flash crossdomain policy security checkerā26Updated 10 years ago
- ssh session type for metasploitā100Updated 2 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitationā15Updated 7 years ago
- ā20Updated last year
- Mapping of Binaries that allows Arbitrary Code Executionā26Updated 7 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versionsā25Updated 8 years ago
- McAfee ePolicy 0wner exploit codeā46Updated 7 years ago
- Check for HTTP Security Headersā14Updated 10 years ago
- Post Exploitation Linux Toolkitā33Updated 9 years ago
- Faraday Continuous Scanningā34Updated 9 years ago
- Projects and POCsā61Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Toolā26Updated 8 years ago
- WhiteBox CMS analysisā68Updated 2 years ago