wildcardcorp / samsonLinks
Cryptanalysis and attack library
☆22Updated 3 years ago
Alternatives and similar repositories for samson
Users that are interested in samson are comparing it to the libraries listed below
Sorting:
- Cerberus is another simple stressing tool simulating DDoS attacks.☆21Updated 3 months ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 7 months ago
- Remove Offensive and Profane Words from Wordlists☆15Updated last year
- ☆20Updated 4 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Tool useful to discover services behind unknown ports☆13Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- ☆20Updated 11 years ago
- ☆13Updated 4 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Open YARA scan- and search engine☆24Updated 4 months ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- module for certexfil☆15Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 8 months ago
- A first look at browser-based Cryptojacking☆16Updated 7 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- ☆13Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass☆14Updated 4 years ago
- ☆17Updated 6 years ago