Your everyday Linux distribution gone Super Saiyan.
☆62Oct 13, 2023Updated 2 years ago
Alternatives and similar repositories for ssj
Users that are interested in ssj are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Oct 22, 2020Updated 5 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Jul 26, 2020Updated 5 years ago
- Perform automated network reconnaissance scans☆238May 4, 2023Updated 2 years ago
- Pull secrets from an AWS environment☆67Feb 2, 2020Updated 6 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Jun 8, 2021Updated 4 years ago
- ☆46Mar 20, 2021Updated 5 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆380Feb 1, 2024Updated 2 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17May 8, 2019Updated 6 years ago
- Enumerate a target Based off of Nmap Results☆76Oct 25, 2023Updated 2 years ago
- Android app to set an static ARP entry on the gateway's MAC address when you connect to a WIFI network☆11Nov 23, 2012Updated 13 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆15Feb 16, 2021Updated 5 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Oct 15, 2022Updated 3 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- Customised Nessus audit scripts☆15Sep 21, 2020Updated 5 years ago
- TypeScript/JavaScript client libraries for Sliver☆25Mar 15, 2026Updated last week
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Webshell, Virtual Private Server (VPS) and cPanel Database☆39Sep 2, 2022Updated 3 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆93Aug 31, 2022Updated 3 years ago
- ☆10May 29, 2023Updated 2 years ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- Yet another content discovery tool☆119Nov 16, 2024Updated last year
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆109Oct 10, 2020Updated 5 years ago
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆40May 21, 2021Updated 4 years ago
- ☆17Oct 4, 2020Updated 5 years ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 4 years ago
- PENIOT: Penetration Testing Tool for IoT☆232Feb 22, 2022Updated 4 years ago