tikeswar / kido
White hat hacking passwords using ML
☆54Updated 3 years ago
Alternatives and similar repositories for kido:
Users that are interested in kido are comparing it to the libraries listed below
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- A collection of personal ZAP scripts☆14Updated last year
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆55Updated 4 years ago
- Some of the presentations given by me☆18Updated 3 months ago
- This extension provide a Python panel for writing custom proxy script.☆15Updated 5 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Python library to extract potential IOCs from a pcap file☆10Updated 5 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- Advanced threat detection solution for Linux.☆36Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated 3 weeks ago
- OptionsBleed (CVE-2017-9798) PoC / Scanner☆19Updated 9 months ago
- ☆30Updated 6 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Self defense post module for metasploit☆17Updated 5 years ago
- Quantum Insert Backdoor POC☆11Updated 7 years ago
- A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.☆28Updated 3 years ago
- discover IP ranges. check email security. survey domains.☆38Updated last year
- various slides and presentations I've worked on☆18Updated 11 months ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆19Updated 2 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- A Scrapy-based crawler for crawling Exploit Database☆12Updated 6 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 3 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- Industrial Security Checklist☆10Updated 8 years ago
- Normalizer for honeypot data.☆11Updated last year
- CVE-2020-12828 PoC and Analysis.☆28Updated 4 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago