☆16Jul 14, 2020Updated 5 years ago
Alternatives and similar repositories for Sublist3r-Scrap
Users that are interested in Sublist3r-Scrap are comparing it to the libraries listed below
Sorting:
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- Scripts to secure and harden Mac OS X☆30Nov 16, 2021Updated 4 years ago
- Scrap Latest Information Security Resources☆35Nov 30, 2020Updated 5 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- ml webshellgg project☆38Nov 29, 2018Updated 7 years ago
- Dota2 Private genksta League☆10Jan 8, 2026Updated last month
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Jan 7, 2021Updated 5 years ago
- Security Tool for Reconnaissance and Information Gathering on a website. (python 3.x)☆462Aug 21, 2023Updated 2 years ago
- android proxy setting tool☆43Jul 2, 2021Updated 4 years ago
- ☆12Feb 16, 2012Updated 14 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Nov 10, 2018Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆44Sep 26, 2016Updated 9 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- Installation script for the API☆10Mar 8, 2020Updated 5 years ago
- Opencart Lipa na Mpesa☆11May 16, 2018Updated 7 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- These are the files used to create the evezor mass production coaster demo http://evezor.com/coasters☆11May 16, 2017Updated 8 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- A nodejs wrapper for nexmo API☆13Apr 6, 2016Updated 9 years ago
- ☆12Mar 11, 2024Updated last year
- ☆12Jun 26, 2025Updated 8 months ago
- ☆12Aug 5, 2021Updated 4 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- NodeJS module for server-side processing using jquery datatables and mongodb native driver.☆10Apr 28, 2022Updated 3 years ago
- My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656☆11Jun 16, 2019Updated 6 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- ☆11Jul 11, 2023Updated 2 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Stateless, Fast and Reliable PDF rendering service.☆13Dec 27, 2020Updated 5 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Install, manage and do everything Open vSwitch and SDN related.☆19Nov 24, 2025Updated 3 months ago
- ATDP source code☆17Jan 28, 2020Updated 6 years ago