☆25Dec 13, 2016Updated 9 years ago
Alternatives and similar repositories for adbrute
Users that are interested in adbrute are comparing it to the libraries listed below
Sorting:
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Jun 11, 2016Updated 9 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Network Mapping and Enumeration Framework☆22Nov 11, 2015Updated 10 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Download exploits from exploit-db.com☆47Jun 26, 2015Updated 10 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- ☆11Apr 28, 2017Updated 8 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- ☆43Sep 2, 2016Updated 9 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- phishing reporting tool☆14Jul 18, 2018Updated 7 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- Git Repo and Filesystem credential scanner☆18Sep 8, 2017Updated 8 years ago