wireghoul / doona
Network based protocol fuzzer
☆71Updated 3 years ago
Alternatives and similar repositories for doona
Users that are interested in doona are comparing it to the libraries listed below
Sorting:
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- Exploits and research stuffs☆54Updated last year
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆30Updated 14 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- unix wildcard attacks☆133Updated 6 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- a collection of payloads for common webapps☆73Updated 12 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 8 years ago
- ☆57Updated 4 years ago
- Metasploit Framework with Viproy installed.☆37Updated 8 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Subdomain brute force focused on speed and data serialization☆74Updated 2 years ago
- ☆63Updated 12 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Shell-style script to search exploit-db.com exploits.☆60Updated 8 months ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 8 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆62Updated 8 years ago