A place for scripts that describe web exploits to live so they can be used in testing
☆20Mar 11, 2013Updated 12 years ago
Alternatives and similar repositories for Websploit-Tests
Users that are interested in Websploit-Tests are comparing it to the libraries listed below
Sorting:
- Use security tools from within IRC.☆24Mar 20, 2012Updated 13 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- 暴力检测一些qq企业邮箱弱口令的用户。以提醒他们修改密码☆13Nov 25, 2015Updated 10 years ago
- 思考与总结☆10Feb 18, 2016Updated 10 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- All-in-One WebSploit Installer for Android Devices (Termux) Created by @Voldemort1912☆12Feb 20, 2019Updated 7 years ago
- experiments in SDR-based pseudo-doppler direction finding☆24Jan 9, 2023Updated 3 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- Simple python script to scan some weak things.☆14Nov 2, 2015Updated 10 years ago
- joomla 反序列化漏洞 getshell EXP,感觉别人的用着不太对,所以自己动手造了一个☆15Dec 17, 2015Updated 10 years ago
- 绿盟远程评估扫描器报告自动整理,扫描,排列☆17Jul 11, 2018Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Internet mapping artware☆24Nov 3, 2016Updated 9 years ago
- phpstudy批量检测mysql弱口令☆20Dec 2, 2015Updated 10 years ago
- EQGRP-Free-Files here.,☆46Aug 16, 2016Updated 9 years ago
- PyCommands for Immunity Debugger☆29Mar 30, 2013Updated 12 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main …☆28Jul 24, 2017Updated 8 years ago
- Taggant System developed by the Malware Working Group of ICSG (Industry Connections Security Group) under the umbrella of IEEE☆34Jan 10, 2018Updated 8 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- A serious attempt to implement multi-threading to nmap module, which would result in faster scanning speed. I know that one can write NSE…☆27Oct 13, 2018Updated 7 years ago
- omron工 控设备漏洞批量验证☆31Dec 17, 2015Updated 10 years ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆93Apr 24, 2019Updated 6 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- github信息泄露搜集工具。GSIL升级版,去除发邮件方式,将结果保存在本地☆13Mar 20, 2021Updated 4 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Android for Boundary Devices platforms☆13Sep 10, 2025Updated 5 months ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Jan 1, 2025Updated last year
- a poc framework to test hosts via zoomeye sdk☆32Jun 26, 2017Updated 8 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Mar 24, 2014Updated 11 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- Open Source Web Application Firewall Anti Tamper☆49Jul 26, 2013Updated 12 years ago
- MSF database code, gemified☆55Feb 4, 2026Updated 3 weeks ago