Examine HTTP response headers for common security issues
☆38Jun 7, 2022Updated 3 years ago
Alternatives and similar repositories for HandyHeaderHacker
Users that are interested in HandyHeaderHacker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 9 years ago
- Deploy payloads to *Nix systems en masse☆108Apr 24, 2020Updated 5 years ago
- Bash simulator to control a server using PHP system functions.☆100Nov 21, 2020Updated 5 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- MS17-010☆63Jul 21, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Rogue Synergy server☆18Mar 8, 2017Updated 9 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆70Aug 19, 2020Updated 5 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Learning about disassembling☆20Oct 28, 2019Updated 6 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 9 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 9 years ago
- hack400tool☆110Jan 17, 2018Updated 8 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- Have fun!☆31Nov 5, 2017Updated 8 years ago
- ☆278Jun 1, 2020Updated 5 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Jan 11, 2015Updated 11 years ago
- application server attack toolkit☆689Apr 6, 2020Updated 6 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆21Dec 23, 2017Updated 8 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆31Nov 14, 2014Updated 11 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆170May 3, 2018Updated 7 years ago
- A multi-threaded Python tool to generate screenshot of websites☆31Dec 3, 2015Updated 10 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago