Your everyday Linux distribution gone Super Saiyan.
☆62Oct 13, 2023Updated 2 years ago
Alternatives and similar repositories for ssj
Users that are interested in ssj are comparing it to the libraries listed below
Sorting:
- Perform automated network reconnaissance scans☆238May 4, 2023Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Oct 22, 2020Updated 5 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Jun 8, 2021Updated 4 years ago
- A utility to quickly map IP addresses to their respective ASN☆20Aug 26, 2023Updated 2 years ago
- Pull secrets from an AWS environment☆67Feb 2, 2020Updated 6 years ago
- ☆46Mar 20, 2021Updated 4 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 4 years ago
- ☆10May 29, 2023Updated 2 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Sep 25, 2020Updated 5 years ago
- #crypto #cipher #encode #decode #hash☆52Mar 27, 2021Updated 4 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- Customised Nessus audit scripts☆15Sep 21, 2020Updated 5 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆381Feb 1, 2024Updated 2 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Nov 18, 2021Updated 4 years ago
- ☆17Oct 4, 2020Updated 5 years ago
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- Fast and extensible network scanning library featuring multithreading, ping probing, and scan fetchers.☆40May 1, 2020Updated 5 years ago
- ☆16Nov 10, 2018Updated 7 years ago
- F5 BIG-IP 任意 文件读取+远程命令执行RCE☆13Jul 8, 2020Updated 5 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Apr 20, 2021Updated 4 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Aug 31, 2022Updated 3 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- A polyglot payload generator☆242Aug 15, 2022Updated 3 years ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆203Jul 14, 2021Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago