Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration
☆16May 26, 2017Updated 8 years ago
Alternatives and similar repositories for HSRPwn
Users that are interested in HSRPwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sn0ffer - Make sound/noise/music with your network connection!☆20Jul 1, 2016Updated 9 years ago
- ☆14May 18, 2022Updated 3 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- Tool to dump cisco device configs via snmp and/or add new users☆13Mar 10, 2026Updated 2 weeks ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- ☆15Jun 7, 2021Updated 4 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- ☆17May 7, 2019Updated 6 years ago
- ☆19Jan 12, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PNG IDAT chunks ~ payload generator☆15Jun 14, 2016Updated 9 years ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆662Mar 11, 2024Updated 2 years ago
- JuJuDensets / Toki MiSTer core☆16May 6, 2024Updated last year
- Virtualization Security Audit Tool - Security assess CIS compliance of a Virtualization environments☆15Nov 21, 2023Updated 2 years ago
- Find phishing kits which use your brand/organization's files and image.☆239Jan 21, 2019Updated 7 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated 2 months ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Stop searching for sample hashes on 10 different sites.☆66May 31, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆26Mar 31, 2024Updated last year
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆23Apr 29, 2022Updated 3 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- A network scanning solution for information gathering in large IT/OT network environments.☆31Sep 15, 2025Updated 6 months ago
- ☆23Mar 17, 2024Updated 2 years ago
- Performs DNS zone dumps by walking DNSSEC NSEC(3) records.☆30Oct 1, 2022Updated 3 years ago
- red team tips and trix☆12Jun 27, 2025Updated 8 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆47Aug 2, 2023Updated 2 years ago
- Password Breach API Server☆88Jul 2, 2025Updated 8 months ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 8 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago