Detection script for the ROBOT vulnerability
☆270Jul 22, 2022Updated 3 years ago
Alternatives and similar repositories for robot-detect
Users that are interested in robot-detect are comparing it to the libraries listed below
Sorting:
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- A fuzzing script for MitmProxy☆24May 15, 2015Updated 10 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆864Feb 12, 2026Updated 2 weeks ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- runtime code injector for Linux☆26May 29, 2011Updated 14 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- phpAudit is a simple shell script that scans PHP files for possible security risks.☆26Apr 7, 2013Updated 12 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆201Nov 30, 2017Updated 8 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Growing list of potentially dangerous PHP functions☆52May 1, 2019Updated 6 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Aug 8, 2017Updated 8 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆79Jun 13, 2022Updated 3 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Sep 23, 2017Updated 8 years ago
- Acunetix 0day RCE☆193May 2, 2016Updated 9 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Flash XSS Scanner☆54Jun 26, 2016Updated 9 years ago
- BurpJDSer-ng☆29Feb 24, 2026Updated last week
- ☆18Dec 16, 2023Updated 2 years ago
- ROCA: Infineon RSA key vulnerability☆492Oct 19, 2023Updated 2 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Oct 23, 2019Updated 6 years ago
- Burp Suite AMF Extension☆48Sep 24, 2018Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago