subonzyx / notesLinks
☆9Updated 6 years ago
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago
- Some wordpress user enumeration scripts.☆39Updated 8 years ago
- OpenSSH 7.7 - Username Enumeration☆16Updated 4 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- ☆15Updated 2 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- Hello my friends, it is my repo about sql injections. Call me in Telegram: @anakein☆44Updated 4 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆33Updated 8 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Web interface for recon-ng☆14Updated 9 years ago
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆40Updated 6 years ago
- Tool to find SMTP servers vulnerable to open relay☆80Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- python hash cracker☆52Updated 8 months ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆13Updated 4 years ago
- Small backdoor using cookie.☆63Updated 8 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Updated 9 years ago
- A tool to mass scan SQL Injection Vulnerable websites from a file.☆71Updated 8 years ago
- Modern problems require modern solutions☆30Updated 2 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Ruby based reverse IP-lookup tool.☆57Updated 4 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- ☆58Updated 6 years ago