SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.
☆43Nov 24, 2014Updated 11 years ago
Alternatives and similar repositories for yeti
Users that are interested in yeti are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Apr 21, 2017Updated 8 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- SQL Injection without the pain of syringes.☆25Apr 20, 2017Updated 8 years ago
- SApCap is a SAP packet sniffer and decompression tool for analysing SAP GUI (DIAG) traffic☆17Apr 20, 2017Updated 8 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Sep 9, 2015Updated 10 years ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- The Bi-directional Link Extractor.☆53Apr 20, 2017Updated 8 years ago
- Mainframe bruter and screen automation utility.☆42Sep 28, 2014Updated 11 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- Big Iron Recon & Pwnage☆125Nov 8, 2021Updated 4 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Apr 11, 2017Updated 8 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- Network Mapping and Enumeration Framework☆22Nov 11, 2015Updated 10 years ago
- PSIKOTIK TSO User Enumerator☆17Aug 24, 2017Updated 8 years ago
- A script to generate the Hackers Against Humanity deck.☆13Jan 21, 2024Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆20Jun 29, 2016Updated 9 years ago
- sniff inputs type☆10Aug 3, 2017Updated 8 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Snoopy v2.0 - modular digital terrestrial tracking framework☆445Mar 5, 2017Updated 9 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- Local and Remote Maltego Rapid Transform Development Framework☆105Aug 8, 2016Updated 9 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago