secretsquirrel / PlagiarismCheckerLinks
Quick script to check for plagiarism between two documents
☆16Updated 4 years ago
Alternatives and similar repositories for PlagiarismChecker
Users that are interested in PlagiarismChecker are comparing it to the libraries listed below
Sorting:
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Python driver for Wappalyzer, a web application detection utility.☆11Updated 5 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Updated last year
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Trying to take the dum-dum out of security☆12Updated 8 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Port scanning and domain utility.☆30Updated 8 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Updated 8 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Updated 9 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆27Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- Yet another OSINT automator.☆19Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆11Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- buffer overflow examples☆22Updated 7 years ago
- Spider or repeater to find all links.☆11Updated 4 years ago
- The Advanced Automated Pentesting And Forensics Tool☆27Updated last year
- Useful Windows and AD tools☆15Updated 3 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Simple CLI script to check if you have a password that has been compromised in a data breach.☆54Updated 3 months ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago