Exploit framework written in Go
☆29Mar 2, 2018Updated 8 years ago
Alternatives and similar repositories for gosploit
Users that are interested in gosploit are comparing it to the libraries listed below
Sorting:
- Exploiting cameras with a very distinctive HTTP Server header of "JAWS/1.0".☆10Jan 11, 2023Updated 3 years ago
- CCTV Remote Code Execution Metasploit Module☆10Aug 12, 2016Updated 9 years ago
- TCP Network Port Scanner written in Go, nmap style.☆19Mar 7, 2020Updated 5 years ago
- a python script to Ddos website☆14Dec 25, 2021Updated 4 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Bitcoin private key cracker use brute force. Everyone can use it. Best wishes!☆25Nov 16, 2017Updated 8 years ago
- Simple golang shodan cli☆49Apr 1, 2021Updated 4 years ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- NMap XML decoding for logstash☆28Nov 16, 2022Updated 3 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Mar 13, 2019Updated 6 years ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Oct 27, 2013Updated 12 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Jul 19, 2021Updated 4 years ago
- Puppet module for Auditd☆41Jan 26, 2021Updated 5 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- [READ ONLY] Subtree split of the siyuan-packages-monorepo (see https://github.com/Zuoqiu-Yingyi/siyuan-packages-monorepo)☆12Jan 23, 2024Updated 2 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- Zend_Tool extension to provide ability to generate DDD classes for ZF project☆13Jun 8, 2011Updated 14 years ago
- StreamlitとLangGraphで実装したHuman-in-the-loop広告コピー文生成アプリケーション☆11Feb 15, 2025Updated last year
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Mar 26, 2022Updated 3 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Python scripts to interact with the virustotal.com Public API☆30Feb 24, 2019Updated 7 years ago
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- A Terraform module to create an Identity and Access Management (IAM) Role on Amazon Web Services (AWS). https://aws.amazon.com/iam☆10Apr 6, 2022Updated 3 years ago
- Python3 Module to interact with the SonicWall® SonicOS API☆14Jan 6, 2025Updated last year
- Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients usin…☆12Jun 23, 2020Updated 5 years ago
- El mejor Bot de música para los servidores de Discord, control de música y muchas funciones avanzadas.☆10Updated this week
- Clockify to jira time entries migrator☆10Jan 14, 2025Updated last year
- ☆11Dec 5, 2022Updated 3 years ago
- MinIO nodes for n8n☆11Updated this week
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- bot and proxy for Minecraft☆24May 7, 2013Updated 12 years ago