syhunt / huntpadLinks
An open-source notepad with features that are particularly useful to penetration testers
☆63Updated 4 years ago
Alternatives and similar repositories for huntpad
Users that are interested in huntpad are comparing it to the libraries listed below
Sorting:
- Joomla Vulnerability Component Scanner☆61Updated 7 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 4 years ago
- Working Python test and PoC for CVE-2018-11776, includes Docker lab☆125Updated 7 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- A collection of Burp Suite extensions☆30Updated 9 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- ☆101Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 7 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50Updated 7 years ago
- A curated list of rootkits found on Github and other sites.☆64Updated 8 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- Advanced Netstat Using Python For Windows☆46Updated 8 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- This repo is all about myself coded exploit codes :)☆54Updated 6 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- Some scripts and exploits☆147Updated 7 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 7 years ago
- Windows Remote Post Breach Tool via Telegram☆134Updated 7 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- ☆66Updated 7 years ago
- An Advanced Web Crawler and DirBuster☆114Updated 3 years ago
- Powershell script to setup windows port forwarding using native netsh client☆125Updated 7 years ago
- SMB Relay Attack Script☆148Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- A small collection of Burp Suite extensions, written in Python☆10Updated 8 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago