wildcardcorp / samsonLinks
Cryptanalysis and attack library
☆22Updated 3 years ago
Alternatives and similar repositories for samson
Users that are interested in samson are comparing it to the libraries listed below
Sorting:
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- ☆70Updated 7 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Cryptographic Dataset Generation & Modelling Framework☆40Updated 5 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 6 years ago
- Network Tools☆34Updated 2 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆26Updated 8 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Tool useful to discover services behind unknown ports☆13Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Open-source Exploiting Framework☆30Updated 8 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated last week
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 4 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Updated 5 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated 2 months ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 8 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Public exploits☆16Updated 7 years ago
- Complete SMS packet manipulation☆113Updated 4 years ago