Detection script for the ROBOT vulnerability
☆269Jul 22, 2022Updated 3 years ago
Alternatives and similar repositories for robot-detect
Users that are interested in robot-detect are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆871Feb 12, 2026Updated 2 months ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆162Feb 2, 2023Updated 3 years ago
- Searches for interesting cached DNS entries.☆56May 15, 2014Updated 11 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- phpAudit is a simple shell script that scans PHP files for possible security risks.☆26Apr 7, 2013Updated 13 years ago
- Reproducing resuts from old papers on modern filesystems☆23Oct 26, 2017Updated 8 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- A fuzzing script for MitmProxy☆25May 15, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Growing list of potentially dangerous PHP functions☆52May 1, 2019Updated 7 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Jan 4, 2017Updated 9 years ago
- Timeinator is an extension for Burp Suite that can be used to perform timing attacks over an unreliable network such as the internet.☆22May 9, 2023Updated 2 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- ☆98Mar 16, 2016Updated 10 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 9 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Acunetix 0day RCE☆193May 2, 2016Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆202Nov 30, 2017Updated 8 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- HP printer security research code☆91Nov 20, 2017Updated 8 years ago
- Smart Install Exploitation Tool☆594Dec 21, 2021Updated 4 years ago
- Burp Suite AMF Extension☆48Sep 24, 2018Updated 7 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 10 years ago
- BurpJDSer-ng☆28Apr 16, 2026Updated 2 weeks ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆189Sep 21, 2020Updated 5 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,297Dec 23, 2018Updated 7 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Tool for checking Whether a domain or its multiple sub-domains are up and running.☆72Jan 21, 2019Updated 7 years ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆47Oct 25, 2019Updated 6 years ago