unweb / plown
Security scanner tool for Plone CMS.
☆19Updated 12 years ago
Alternatives and similar repositories for plown:
Users that are interested in plown are comparing it to the libraries listed below
- Format string exploit generation☆10Updated 9 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 11 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- Network based protocol fuzzer☆69Updated 2 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Updated 9 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18Updated 4 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- NMAP Patches and NSE Scripts☆19Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- put this here because archival reasons.☆28Updated 6 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Communicate with a remote shell easily☆12Updated 7 years ago
- Windows Privesc Check☆20Updated 10 years ago
- Miscellaneous analysis tools☆26Updated 9 years ago
- ☆28Updated 8 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- Exploits and research stuffs☆54Updated last year
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- Universal stack-based buffer overfow exploitation tool☆22Updated 10 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆14Updated last year
- Damn vulnerable linux device driver for people to play with.☆28Updated 4 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago