Smart Meter Security Testing Framework
☆271Sep 21, 2024Updated last year
Alternatives and similar repositories for termineter
Users that are interested in termineter are comparing it to the libraries listed below
Sorting:
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- IPv6 analysis tool: the other side☆36Jan 5, 2014Updated 12 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆163Jan 21, 2021Updated 5 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Sep 9, 2015Updated 10 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆124Feb 4, 2019Updated 7 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- ☆28Feb 11, 2016Updated 10 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- A JBoss script for obtaining remote shell access☆177Aug 7, 2020Updated 5 years ago
- wifitap updated for BT5r3☆154Mar 28, 2017Updated 8 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- Phishing Scenarios Used for Phishing Frenzy☆208Oct 30, 2019Updated 6 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆263Oct 31, 2017Updated 8 years ago
- Check for valid credentials across a network over SMB☆267Jan 5, 2024Updated 2 years ago
- ☆58Nov 27, 2014Updated 11 years ago
- Tinba Banking Trojan☆87Feb 25, 2015Updated 11 years ago
- Wireless mouse/keyboard attack with replay/transmit poc☆93Jul 10, 2016Updated 9 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Jun 10, 2016Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Ruby on Rails Phishing Framework☆881Nov 7, 2023Updated 2 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆506Jun 27, 2019Updated 6 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago