White hat hacking passwords using ML
☆53Apr 23, 2021Updated 4 years ago
Alternatives and similar repositories for kido
Users that are interested in kido are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A python script for digital image steganography using Fast Fourier Transform.☆11Aug 30, 2024Updated last year
- a safedog fuzzing python script☆18Apr 15, 2018Updated 7 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- 灵蛇·代理抓取工具☆16Aug 31, 2021Updated 4 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- A simple tool to do linux emergency check☆11Mar 16, 2020Updated 6 years ago
- A ping detection tool for linux☆24Apr 20, 2020Updated 5 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- 学习使我快乐!☆14Updated this week
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop)☆29Apr 23, 2020Updated 5 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- A simple way to exfiltrate data using spotify API☆20Feb 11, 2026Updated last month
- An epic web shell☆83Jun 10, 2025Updated 9 months ago
- A C# tool to send emails through Outlook from the command line or in memory☆32Jun 17, 2020Updated 5 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- remote control an android phone via ADB☆10Nov 17, 2015Updated 10 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Faraday's Command Line Interface☆52Feb 12, 2026Updated last month
- White-hat hacking keylogger☆18Apr 9, 2015Updated 10 years ago
- 过各waf注入上传等☆25Mar 23, 2018Updated 8 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- ☆34Feb 26, 2015Updated 11 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- Control your server's `traceroute` reply☆11Jun 12, 2016Updated 9 years ago
- PoC for CVE-2020-1015☆39May 16, 2020Updated 5 years ago
- Wordlists generated over the years of penetration testing☆14Mar 18, 2025Updated last year
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Jira Information Gatherer☆29Dec 3, 2017Updated 8 years ago
- Converts an IP Address range to CIDR blocks in Go☆11Feb 10, 2021Updated 5 years ago