qsantos / rainbow
Rainbow tables utilities
☆34Updated 10 years ago
Alternatives and similar repositories for rainbow:
Users that are interested in rainbow are comparing it to the libraries listed below
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- pentest toolbox☆28Updated 2 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Updated 12 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- UPnP hacking scripts and tools☆76Updated 8 years ago
- Software exploitation training material☆15Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Some useful tools and scripts☆45Updated 2 years ago
- A fuzzing script for MitmProxy☆22Updated 9 years ago
- ☆11Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- ☆10Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- ☆11Updated 8 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Graphical user interface for the windows version of THC Hydra☆52Updated 7 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Windows Privesc Check☆20Updated 10 years ago
- Automatically exported from code.google.com/p/surfjack - not actively maintained☆9Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆36Updated 11 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- ☆20Updated last year
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- A collection of scripts and tools I have authored to aid in Pentesting, provided under GNUv3, NOTE: I am not liable if you use them for i…☆34Updated 6 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- ☆12Updated 10 years ago