pwnwiki / pwnwiki-toolsView external linksLinks
Collection of binaries and scripts found across the net
☆20Dec 2, 2013Updated 12 years ago
Alternatives and similar repositories for pwnwiki-tools
Users that are interested in pwnwiki-tools are comparing it to the libraries listed below
Sorting:
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 10 years ago
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆47May 27, 2017Updated 8 years ago
- Unofficial Kali Documentation Project☆160Feb 27, 2015Updated 10 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Jun 5, 2017Updated 8 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆247Aug 12, 2014Updated 11 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Apr 22, 2015Updated 10 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- meterpreter☆11Mar 31, 2018Updated 7 years ago
- Upgrading jsleak with a CI/CD and new rules☆16May 6, 2023Updated 2 years ago
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- ☆15Sep 21, 2019Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆32Mar 21, 2015Updated 10 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- This repository contains the source code of the OWASP TOP 10 NodeJS Panel I have used☆10Nov 20, 2022Updated 3 years ago
- Operational toolset utilizing git's submodule feature☆57Feb 6, 2013Updated 13 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 5 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆113Aug 31, 2023Updated 2 years ago
- Documentation for MX Linux☆12Jan 17, 2026Updated last month
- Collection of exploits developed by your friendly clown☆15Oct 18, 2025Updated 3 months ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Helper scripts to remaster Linux Live CD images for the purpose of creating ready to use security wargames with pre-installed vulnerabili…☆52Feb 21, 2021Updated 4 years ago
- Ambush Host Intrusion Prevention System☆65Sep 8, 2013Updated 12 years ago
- Crawler based on a modified browser to detect online tracking.☆11Jul 19, 2023Updated 2 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- Spacehuhn Wiki Source☆13Apr 27, 2023Updated 2 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- ☆10Jan 24, 2024Updated 2 years ago
- The Bi-directional Link Extractor.☆53Apr 20, 2017Updated 8 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Oct 28, 2016Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago