tikeswar / kidoLinks
White hat hacking passwords using ML
☆53Updated 4 years ago
Alternatives and similar repositories for kido
Users that are interested in kido are comparing it to the libraries listed below
Sorting:
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 5 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 6 years ago
- Essential tool for finding blind injection attacks.☆50Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 7 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 5 years ago
- A Python3 module to assist in fuzzing web applications☆57Updated 2 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Updated 6 years ago
- Self defense post module for metasploit☆17Updated 6 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆29Updated 4 years ago
- Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB☆24Updated last year
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆41Updated 7 years ago
- ☆37Updated 7 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Quantum Insert Backdoor POC☆11Updated 8 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- XPT - XSS Polyglot Tester☆36Updated 6 years ago
- "Zero Click" Remote Code Execution in Mycroft AI vocal assistant☆55Updated 7 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 6 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Updated 3 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆136Updated 6 years ago
- ☆50Updated 5 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Updated 6 years ago
- Repo for proof of concept exploits and tools.☆56Updated 5 years ago
- NmapPy - Python implementation of Nmap☆35Updated 7 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Updated 9 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆67Updated 5 years ago