thesp0nge / wordstress
A security scanner for Wordpress blogging engine
☆32Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for wordstress
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 5 years ago
- µphisher spear phishing tool (reference implementation)☆38Updated 4 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 8 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Weape-Wireless-EAP-Extractor☆26Updated 11 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆61Updated 8 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- ☆25Updated 7 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Websocket based egress tester☆20Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- library and intepreter for penetration testing tools☆27Updated 8 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Puny Domain Name Check☆36Updated 5 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆48Updated last year
- Network Scanner for OpenSSL Memory Leak (CVE-2014-0160)☆11Updated 9 years ago
- Faraday Continuous Scanning☆33Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Tools for use with phishing frenzy☆11Updated 5 years ago
- Write simple security regression tests for your network infrastructure.☆19Updated 12 years ago
- Automated Security Assessment Reporting Tool☆39Updated 6 years ago