shayanb / cryptojacking-first-paper
A first look at browser-based Cryptojacking
☆15Updated 6 years ago
Related projects: ⓘ
- Public exploits☆15Updated 6 years ago
- Telnet-2 allows to connect via Tor and define a custom timeout☆10Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- All xxx-arsenal repos in one☆14Updated 5 years ago
- GhostSec Scam Detection Tool☆12Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 4 years ago
- Various tools i created for my own use☆10Updated 6 years ago
- Wordlists generated over the years of penetration testing☆10Updated 4 months ago
- Phishing can't get any easier with Tilapia☆11Updated last year
- ☆12Updated last year
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆11Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- ☆11Updated this week
- Get trails tool: Get all urls indexed of target☆19Updated 2 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆32Updated 3 years ago
- Intelligence gathering framework☆12Updated 9 years ago
- ☆27Updated this week
- SPIZZLE, The Onion Spider.☆13Updated 6 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- Subdomain crawler with wordlist using python☆13Updated 4 years ago
- ☆10Updated this week
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆12Updated 4 months ago
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆12Updated 2 years ago
- ☆16Updated this week
- Auto Web Vulnerability Scanning Framework☆11Updated 8 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆19Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆25Updated 2 years ago
- [BASH] Password generator through a wordlist☆12Updated 11 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- BDsploit (Big Data Exploitation and Post-exploitation Toolkit)☆5Updated 7 months ago