SQL Injection without the pain of syringes.
☆25Apr 20, 2017Updated 8 years ago
Alternatives and similar repositories for squeeza
Users that are interested in squeeza are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆42Nov 24, 2014Updated 11 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- sniff inputs type☆10Aug 3, 2017Updated 8 years ago
- A websocket proxy☆55Nov 13, 2017Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆23Feb 9, 2018Updated 8 years ago
- The Bi-directional Link Extractor.☆53Apr 20, 2017Updated 8 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Our fork of the esp-link firmware with a built in VNC server for passing input events to an AVR. Part of our Universal Serial aBUSe proje…☆11Dec 7, 2016Updated 9 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- meow☆12Dec 6, 2015Updated 10 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Obfuscated Invoke-Mimikatz☆52Oct 23, 2018Updated 7 years ago
- ☆16May 22, 2015Updated 10 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆284Aug 8, 2021Updated 4 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Apr 1, 2026Updated last week
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Jan 13, 2018Updated 8 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 12 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- Big Iron Recon & Pwnage☆125Nov 8, 2021Updated 4 years ago
- NTP Scanner and 'monlist' checker☆13Sep 1, 2015Updated 10 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago