rpranshu / DeadOrAlive
A simple tool to check whether a particular host is alive or not!
☆22Updated 3 years ago
Alternatives and similar repositories for DeadOrAlive:
Users that are interested in DeadOrAlive are comparing it to the libraries listed below
- A simple bash based metasploit automation tool!☆121Updated last year
- EternalView is an all in one basic information gathering and vulnerability assessment tool☆136Updated 4 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆61Updated 5 years ago
- Hacking challenges☆32Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Query Shodan and Censys data for fast parsing☆38Updated 6 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆56Updated 2 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 6 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- Massive arsenal of hacker tools...☆77Updated 7 years ago
- try privilege escalation changing sudo command☆118Updated 6 years ago
- Metasploit Framework☆26Updated 7 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆105Updated 4 years ago
- Password cracking utility☆53Updated 3 years ago
- Pentest tools for Windows hacking processes☆12Updated 7 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 8 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago