realytcracker / go-jamcracker
a simple animal jam brute force password cracker with concurrency
☆31Updated 2 years ago
Alternatives and similar repositories for go-jamcracker:
Users that are interested in go-jamcracker are comparing it to the libraries listed below
- Proof of Concept for CVE-2018-11776☆20Updated 6 years ago
- Leveraging CVE-2018-19788 without root shells☆18Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- CTF Writeups☆19Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Updated 6 years ago
- Framework for Making Environmental Keyed Payloads☆12Updated 8 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 2 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 11 months ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- Experiments with git blobs☆9Updated 6 years ago
- Format string exploit generation☆10Updated 9 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Updated 7 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 10 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- ☆11Updated 7 years ago
- Application Security library☆11Updated 12 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago