Ucki's Recon & Enumeration Pack
☆39May 9, 2016Updated 9 years ago
Alternatives and similar repositories for URP
Users that are interested in URP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My pentest cheat sheet☆16Apr 27, 2017Updated 9 years ago
- ☆14Jun 19, 2018Updated 7 years ago
- ☆26Sep 1, 2017Updated 8 years ago
- OAuth Security Cheatsheet☆40May 12, 2014Updated 11 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Sep 19, 2016Updated 9 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Nov 9, 2018Updated 7 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- C# tool to discover low hanging fruits☆94Dec 15, 2022Updated 3 years ago
- ☆510May 27, 2018Updated 7 years ago
- A Magento package containing a quick-and-dirty PHP shell.☆20Nov 12, 2014Updated 11 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- meow☆12Dec 6, 2015Updated 10 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆21Nov 15, 2018Updated 7 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆629Jun 8, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Aug 14, 2017Updated 8 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Jan 13, 2018Updated 8 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 12 years ago
- collection of pentest tools☆26Aug 4, 2019Updated 6 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- All-in-One WP Migration-Backup-Finder☆15Nov 5, 2025Updated 5 months ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- A list of Information Security firms operating in th Asia-Pacific region, and where student intake opportunities can be found.☆24Oct 30, 2020Updated 5 years ago
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆14Aug 4, 2025Updated 8 months ago