SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.
☆43Nov 24, 2014Updated 11 years ago
Alternatives and similar repositories for yeti
Users that are interested in yeti are comparing it to the libraries listed below
Sorting:
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- The Bi-directional Link Extractor.☆53Apr 20, 2017Updated 8 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Sep 9, 2015Updated 10 years ago
- Mainframe bruter and screen automation utility.☆43Sep 28, 2014Updated 11 years ago
- Big Iron Recon & Pwnage☆124Nov 8, 2021Updated 4 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆20Jun 29, 2016Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- Network Mapping and Enumeration Framework☆22Nov 11, 2015Updated 10 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Some of my Nmap scripts☆22Aug 3, 2017Updated 8 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Prometheus Firewall Analyzer☆48May 1, 2015Updated 10 years ago
- Snoopy v2.0 - modular digital terrestrial tracking framework☆445Mar 5, 2017Updated 8 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Apr 11, 2017Updated 8 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- Automated Recon Framework☆24Oct 3, 2020Updated 5 years ago
- A repo to hold some scripts pertaining WMI (Windows implementation of WBEM) forensics☆88Oct 6, 2017Updated 8 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆284Aug 8, 2021Updated 4 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- Nikto for Windows with some extra features.☆184Apr 20, 2017Updated 8 years ago
- Python script for peforming basic Evil Twin attacks on open wifi networks. Written for my tutorial on the subject.☆38Sep 20, 2016Updated 9 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago