supernothing / sergio-proxy
Automatically exported from code.google.com/p/sergio-proxy
☆48Updated 10 years ago
Alternatives and similar repositories for sergio-proxy:
Users that are interested in sergio-proxy are comparing it to the libraries listed below
- Simple reverse ICMP shell☆41Updated 11 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Removed according to regulations☆35Updated 7 years ago
- An ARP Poisoning Defender script☆42Updated 6 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- unix wildcard attacks☆131Updated 6 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- WPS scan and pwn tool☆66Updated 5 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 11 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- IP Address Listing Tool☆12Updated 11 years ago
- ☆53Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows