Ucki's Recon & Enumeration Pack
☆39May 9, 2016Updated 9 years ago
Alternatives and similar repositories for URP
Users that are interested in URP are comparing it to the libraries listed below
Sorting:
- My pentest cheat sheet☆16Apr 27, 2017Updated 8 years ago
- ☆14Jun 19, 2018Updated 7 years ago
- ☆26Sep 1, 2017Updated 8 years ago
- ☆51Jun 24, 2016Updated 9 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Sep 19, 2016Updated 9 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Nov 9, 2018Updated 7 years ago
- collection of pentest tools☆26Aug 4, 2019Updated 6 years ago
- OAuth Security Cheatsheet☆41May 12, 2014Updated 11 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities.☆72Jan 21, 2020Updated 6 years ago
- gtfobin checker☆11Oct 25, 2020Updated 5 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Simple webinterface combining different recon tools.☆12Mar 2, 2018Updated 8 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- Nuclei is a fast tool for configurable targeted vulnerability scanning based on templates offering massive extensibility and ease of use.☆13Aug 4, 2025Updated 6 months ago
- ☆509May 27, 2018Updated 7 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- ☆30Jul 17, 2018Updated 7 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 11 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆627Jun 8, 2018Updated 7 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- CLI for programmatic trading of cryptocurrencies on GDAX☆17Jan 16, 2018Updated 8 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- C# tool to discover low hanging fruits☆94Dec 15, 2022Updated 3 years ago
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- ☆49Jul 26, 2014Updated 11 years ago