A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.
☆16Apr 21, 2017Updated 8 years ago
Alternatives and similar repositories for 6thSense
Users that are interested in 6thSense are comparing it to the libraries listed below
Sorting:
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Nov 24, 2014Updated 11 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Our fork of the esp-link firmware with a built in VNC server for passing input events to an AVR. Part of our Universal Serial aBUSe proje…☆11Dec 7, 2016Updated 9 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Sep 9, 2015Updated 10 years ago
- Disconnects client from router☆14Jul 28, 2017Updated 8 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- eSentire additions to the nmap network scanner☆14Mar 29, 2016Updated 9 years ago
- Identify web application versions☆18Apr 14, 2017Updated 8 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Jan 22, 2019Updated 7 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- TCP session interception and injection framework☆55Mar 22, 2011Updated 14 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Jun 28, 2015Updated 10 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19May 20, 2020Updated 5 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- The Bi-directional Link Extractor.☆53Apr 20, 2017Updated 8 years ago
- A Simple Keylogger with the ability of FTP Transfer and Local Storage☆21Aug 17, 2024Updated last year
- WHY?☆18Sep 4, 2016Updated 9 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- An HTTP requests flooder made in Python☆21Aug 21, 2020Updated 5 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Jun 6, 2023Updated 2 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago