sensepost / JBaah
HTTP Brute Forcer (Java replacement for SP's CrowBar).
☆11Updated 7 years ago
Related projects: ⓘ
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 7 years ago
- SQL Injection without the pain of syringes.☆24Updated 7 years ago
- ☆14Updated this week
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 4 years ago
- Automated install process for Phishing Frenzy☆23Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 4 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 13 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- Burp Suite plugin for the Dradis Framework☆12Updated 3 weeks ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- ☆30Updated this week
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 3 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- µphisher spear phishing tool (reference implementation)☆38Updated 4 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago
- Tools for use with phishing frenzy☆11Updated 5 years ago
- ☆14Updated this week
- ☆12Updated this week
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 9 years ago
- ☆21Updated this week
- Here comes the paintrain!☆11Updated 8 years ago
- ☆51Updated this week
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- Gmail Knocker☆21Updated 7 years ago