threat9 / threat9-test-bedLinks
☆29Updated 7 years ago
Alternatives and similar repositories for threat9-test-bed
Users that are interested in threat9-test-bed are comparing it to the libraries listed below
Sorting:
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆44Updated 9 years ago
- CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets.☆43Updated 14 years ago
- Quick script to gather stats on incoming credentials and IPs for a honey listener.☆110Updated 3 years ago
- A Script to Convert Debian Linux into Kali Linux☆55Updated 6 years ago
- Metasploit Framework☆28Updated 11 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆128Updated 7 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆13Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 4 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆86Updated 6 years ago
- ESPot - ElasticSearch Honeypot☆27Updated 11 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆19Updated 6 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Recon-ng is a full-featured Web Reconnaissance framework written in Python.☆38Updated 9 years ago
- Misc scripts and tools for WiFi☆106Updated 4 years ago
- archive of code from http://www.unicornscan.org/☆79Updated 13 years ago
- Automatically exported from code.google.com/p/hexorbase☆75Updated 8 years ago
- Web-based Source Code Vulnerability Scanner☆21Updated 9 years ago
- Mastering Kali Linux for Advanced Penetration Testing - Second Edition, published by Packt☆63Updated 2 years ago
- Open Standard Vulnerability & Compliance Scanner☆45Updated 9 years ago
- This repo contains scripts, frameworks, and other tools related to DDoS.☆36Updated 6 years ago
- Package manager for hackers built by hackers☆37Updated 7 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆20Updated 9 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 10 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated 3 weeks ago
- ☆19Updated 10 years ago
- The Nmap Scanner for Telco☆163Updated 7 years ago
- Run Kali tools on all distributions. Offline search, including in package descriptions.☆107Updated 7 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆35Updated 7 years ago
- An ARP Poisoning Defender script☆43Updated 7 years ago
- A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, crede…☆21Updated 7 years ago