sharmaji-h4cks / Dragoman--The-DecoderLinks
DRAGOMAN is a Cryptographic tool with multiple decoding scripts that can be used to crack Capture The Flag contests.
β16Updated 8 months ago
Alternatives and similar repositories for Dragoman--The-Decoder
Users that are interested in Dragoman--The-Decoder are comparing it to the libraries listed below
Sorting:
- YARA rule-based automation system to detect network attacks at byte-levelβ15Updated 4 years ago
- Fast Subdomain Enumeration Tool made with Bash only π―β15Updated 3 years ago
- Python script that automate the process of generating various reverse shells.β15Updated 4 years ago
- Cross-Site Scripting (XSS) vulnerability analyzerβ19Updated 2 months ago
- InsideVuln [Inside Vulnerabilities] : Python script to detect vulnerabilities into a PHP source code using statical analysis, based on reβ¦β8Updated 6 years ago
- Deobfuscate Python file Obfuscated by Apollyonβ8Updated 3 years ago
- This Tool is for web penetration Testing.β19Updated 4 years ago
- Tools for bug hunting in a containerβ22Updated last year
- CTFs I've played so farβ17Updated 4 months ago
- A Simple Web Shell used for Remote Code Execution.β11Updated 5 years ago
- Automated Recon Frameworkβ24Updated 4 years ago
- A Python script for extracting encoded text from PNG imagesβ17Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.β20Updated 3 months ago
- It contain google dork to find the wsdl file.β13Updated 5 years ago
- simple code directory bruteβ19Updated 4 years ago
- A simple CLI tool to check WebDAV vulnerabilityβ14Updated 3 years ago
- Tool to automatically email results from your Python scripts to your inbox as text or as a file attachment, storing the sender email accoβ¦β7Updated 5 years ago
- Web application pentesting reconβ23Updated 4 years ago
- Crascan is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner.β31Updated 6 years ago
- Python tool for vulnerability assessment and persistence.β9Updated 4 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!β35Updated 3 years ago
- β13Updated 4 years ago
- Create wordlists from source codes files/directories for enumerationβ30Updated last year
- Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the helβ¦β17Updated 3 years ago
- Bash script to extract data from the Waybackmachineβ11Updated 4 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocolβ31Updated 4 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443β18Updated 4 years ago
- A hacking panel based in Kali tools and more! Only with educational porpuses. The author is not responsable for any damageβ12Updated 3 years ago
- Open Redirect Vulnerability Payload Listβ12Updated 4 years ago
- β48Updated 4 years ago