unweb / plown
Security scanner tool for Plone CMS.
☆19Updated 12 years ago
Alternatives and similar repositories for plown:
Users that are interested in plown are comparing it to the libraries listed below
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Format string exploit generation☆10Updated 9 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Exploit Reliability Testing System☆34Updated 10 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Updated 10 years ago
- The official repo of BSIS☆14Updated 13 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18Updated 4 years ago
- Automated script to search in SMB protocol for availables pipe names☆22Updated 7 years ago
- CANAPE Network Testing Tool☆34Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Network based protocol fuzzer☆71Updated 3 years ago
- ☆14Updated 9 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Communicate with a remote shell easily☆12Updated 7 years ago
- Set up your own CTF with NIZKCTF☆14Updated 7 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- Universal stack-based buffer overfow exploitation tool☆23Updated 11 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 6 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago