praetorian-inc / ruby_hashcatLinks
Command line wrapper, Library, and Rest API for oclHashcat.
☆43Updated 9 years ago
Alternatives and similar repositories for ruby_hashcat
Users that are interested in ruby_hashcat are comparing it to the libraries listed below
Sorting:
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- Clone of Metasploit's wiki w/ additions☆17Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- ☆47Updated 9 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Windows Offline Common Password Hash Checker☆29Updated 9 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆80Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- ☆46Updated 8 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Weape-Wireless-EAP-Extractor☆29Updated 12 years ago
- Exploits and research stuffs☆56Updated 2 weeks ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 9 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Splunk Web Shell☆51Updated 10 years ago