praetorian-inc / ruby_hashcatLinks
Command line wrapper, Library, and Rest API for oclHashcat.
☆43Updated 10 years ago
Alternatives and similar repositories for ruby_hashcat
Users that are interested in ruby_hashcat are comparing it to the libraries listed below
Sorting:
- DNS Enumeration and Reconnaissance Tool☆36Updated 10 years ago
- ssh session type for metasploit☆101Updated 3 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- Exploits and research stuffs☆54Updated 3 weeks ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 10 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Updated 11 years ago
- Projects and POCs☆61Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 7 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Mainframe bruter and screen automation utility.☆43Updated 11 years ago
- Enumerate subdomains through Virustotal☆32Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- Recursively searches a directory for any file containing a specified string☆48Updated 10 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- unix wildcard attacks☆137Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- ☆47Updated 10 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago