r57-labs / chaosView external linksLinks
Origin IP scanning utility developed with ChatGPT
☆69Jun 21, 2023Updated 2 years ago
Alternatives and similar repositories for chaos
Users that are interested in chaos are comparing it to the libraries listed below
Sorting:
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Jul 2, 2025Updated 7 months ago
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆103Dec 8, 2025Updated 2 months ago
- Dump Windows SAM hashes☆42Aug 9, 2023Updated 2 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Jul 1, 2024Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- ☆116Sep 5, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- ☆36Oct 26, 2023Updated 2 years ago
- MultiPlatform HTTP Reverse Shell☆242Dec 31, 2025Updated last month
- A demo exploit for CVE-2021-44026, a SQL injection in Roundcube☆13Dec 22, 2023Updated 2 years ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆42Apr 4, 2025Updated 10 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆108Sep 22, 2023Updated 2 years ago
- A custom Google search (to bypass some limitations on google and VPNs)☆116Jul 7, 2023Updated 2 years ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆66Aug 31, 2024Updated last year
- NetworkAssessment: Network Compromise Assessment Tool☆94May 31, 2024Updated last year
- an exploit of Server-side request forgery (SSRF)☆52Aug 2, 2024Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73May 21, 2023Updated 2 years ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆444Jul 12, 2024Updated last year
- A tool to enumerate and exploit SQL Servers in AD☆33Aug 21, 2023Updated 2 years ago
- Powershell shellcode one-liner. Powershell免杀一句话上线器便捷生成☆54Aug 13, 2023Updated 2 years ago
- ☆55Apr 25, 2023Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- Encodes a payload within a generated mock-CSS file☆59Sep 18, 2023Updated 2 years ago
- wsnet☆26Sep 24, 2025Updated 4 months ago
- ☆90Aug 5, 2023Updated 2 years ago
- Light-weight web security scanner☆150Nov 22, 2025Updated 2 months ago
- A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845☆62Feb 14, 2025Updated last year
- simple ss7 & imsi catcher & kraken☆22Apr 11, 2022Updated 3 years ago
- Shodan Dorks 2023☆245Jan 13, 2025Updated last year
- ☆133Aug 9, 2023Updated 2 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Aug 1, 2023Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated last year
- PoC Script for CVE-2023-4596, unauthenticated Remote Command Execution through arbitrary file uploads.☆24Aug 28, 2025Updated 5 months ago
- Self-hosted passive subdomain continous monitoring tool.☆170Jan 30, 2024Updated 2 years ago
- Vulnerabilities you my miss during a penetration testing.☆97Mar 23, 2024Updated last year