scipag / AttackToolKitLinks
Open-source Exploiting Framework
☆30Updated 8 years ago
Alternatives and similar repositories for AttackToolKit
Users that are interested in AttackToolKit are comparing it to the libraries listed below
Sorting:
- Port scanning and domain utility.☆30Updated 8 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Automation Hacking & Penetration Testing Suite☆11Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Exploit Pack - One step ahead☆12Updated 12 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Bypass XSS Reflected Cross-site scripting☆32Updated 9 years ago
- Multi source CVE/exploit parser.☆28Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 9 years ago
- RSYaba Modular Brute Force Attacker☆19Updated 11 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Various exploits☆10Updated 8 years ago
- pentest toolbox☆28Updated 3 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- Password cracking utility☆53Updated 4 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 10 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 6 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Software exploitation training material☆16Updated 8 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆20Updated 9 years ago
- Small backdoor using cookie.☆64Updated 8 years ago