salassam19 / Exam_Piscine42View external linksLinks
☆15Feb 4, 2016Updated 10 years ago
Alternatives and similar repositories for Exam_Piscine42
Users that are interested in Exam_Piscine42 are comparing it to the libraries listed below
Sorting:
- Framework for Rogue Wi-Fi Access Point Attack☆12Aug 31, 2015Updated 10 years ago
- debian scripts and code☆18Jul 29, 2016Updated 9 years ago
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Sep 24, 2015Updated 10 years ago
- Create one or more monitor-mode virtual wireless interfaces with unique mac addresses.☆12Dec 14, 2018Updated 7 years ago
- ☆19Jun 8, 2017Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- simple script that helps you to Embed a Payload into an Apk easly☆20Feb 22, 2019Updated 6 years ago
- Open Development projects for TekDefense☆78Oct 5, 2016Updated 9 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- MCD's Black Jack is a password cracking tool for linux that cracks md5, sha1, sha256 and sha512 hashes. It uses the Dictionary bruteforci…☆21Dec 28, 2019Updated 6 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Dec 24, 2018Updated 7 years ago
- ☆29Apr 22, 2017Updated 8 years ago
- Get information client with getdatareport (Plugin)☆25Oct 18, 2016Updated 9 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Apr 29, 2021Updated 4 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- ☆59Jan 14, 2018Updated 8 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Aug 4, 2016Updated 9 years ago
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- Passive DNS V2☆60Mar 27, 2014Updated 11 years ago
- pyJoiner - Exe Joiner (Kali Linux Version i386)☆43Feb 5, 2018Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Jun 8, 2019Updated 6 years ago
- DHCP option injector☆42Jul 7, 2020Updated 5 years ago
- Proxy scraper for proxychains☆43Oct 10, 2020Updated 5 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- Hercules - Automated VPN Connect ✔️☆48May 2, 2018Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Automated information gathering tool for pentest☆55Jul 7, 2016Updated 9 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Feb 25, 2021Updated 4 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆51Sep 27, 2016Updated 9 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 5 years ago
- A Cross Site Scripting scanner using selenium webdriver☆55Nov 1, 2019Updated 6 years ago
- Simple vulnerability scanning framework☆51Oct 29, 2016Updated 9 years ago
- ☆54Sep 10, 2016Updated 9 years ago
- This python script is developed to show, how many vulnerables websites, which are laying around on the web. 1) Scan net for urls prone to…☆54Jan 21, 2017Updated 9 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago