Drag and Drop ClickJacking PoC development assistance tool.
☆196Oct 1, 2020Updated 5 years ago
Alternatives and similar repositories for jack
Users that are interested in jack are comparing it to the libraries listed below
Sorting:
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Nov 24, 2014Updated 11 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,096Aug 21, 2018Updated 7 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- Cartero - Social Engineering Framework☆176Mar 8, 2026Updated last week
- A lightweight CSRF Toolkit for easy Proof of concept☆172Jun 11, 2014Updated 11 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- Big Iron Recon & Pwnage☆125Nov 8, 2021Updated 4 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆284Aug 8, 2021Updated 4 years ago
- Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.☆243Mar 10, 2023Updated 3 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- SensePost's modified hostapd for wifi attacks.☆603Aug 5, 2024Updated last year
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- Sniffs sensitive data from interface or pcap☆1,819Nov 2, 2023Updated 2 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Image size issues plugin for Burp Suite☆95Jun 27, 2018Updated 7 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- ☆83Jan 29, 2016Updated 10 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- A GPL fork of the popular wordpress vulnerability scanner WPScan☆214Aug 23, 2019Updated 6 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- Exploit the credentials present in files and memory☆843May 25, 2023Updated 2 years ago