toucan-system / pmcmaView external linksLinks
☆53Aug 24, 2024Updated last year
Alternatives and similar repositories for pmcma
Users that are interested in pmcma are comparing it to the libraries listed below
Sorting:
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Jan 10, 2017Updated 9 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- ☆13May 28, 2013Updated 12 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆27Apr 30, 2011Updated 14 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Search pastebin for keywords using python☆33Mar 12, 2012Updated 13 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- Tutorial for Node.js security☆21Sep 4, 2020Updated 5 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆17Feb 10, 2016Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- IRMA ansible☆24Nov 28, 2016Updated 9 years ago
- Functions Catalog☆28Jul 10, 2019Updated 6 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Modified Nexus 9 kernel for Kenali Project☆30Aug 5, 2019Updated 6 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Feb 1, 2024Updated 2 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 10 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Oct 3, 2012Updated 13 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Jan 21, 2020Updated 6 years ago
- ☆27May 29, 2015Updated 10 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- ☆32Jun 19, 2024Updated last year
- Various tools related to SSL denial of service☆47Sep 23, 2014Updated 11 years ago
- CAFA: A Checksum-Aware Fuzzing Assistant For More Coverage☆31Sep 28, 2018Updated 7 years ago
- Preventing code-reuse attacks by stopping code pointer leakages☆37Feb 24, 2016Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite.☆58May 1, 2015Updated 10 years ago
- A multi-codec media fuzzing tool.☆43Oct 9, 2012Updated 13 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16May 3, 2014Updated 11 years ago