SQL Injection without the pain of syringes.
☆25Apr 20, 2017Updated 8 years ago
Alternatives and similar repositories for squeeza
Users that are interested in squeeza are comparing it to the libraries listed below
Sorting:
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Nov 24, 2014Updated 11 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- sniff inputs type☆10Aug 3, 2017Updated 8 years ago
- A websocket proxy☆55Nov 13, 2017Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- The Bi-directional Link Extractor.☆53Apr 20, 2017Updated 8 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- A remote desktop control suite☆16Jun 28, 2014Updated 11 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- ☆30Nov 14, 2019Updated 6 years ago
- Obfuscated Invoke-Mimikatz☆52Oct 23, 2018Updated 7 years ago
- ☆16May 22, 2015Updated 10 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆284Aug 8, 2021Updated 4 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 12 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- Big Iron Recon & Pwnage☆125Nov 8, 2021Updated 4 years ago
- NTP Scanner and 'monlist' checker☆13Sep 1, 2015Updated 10 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago