wireghoul / doonaLinks
Network based protocol fuzzer
☆75Updated 3 years ago
Alternatives and similar repositories for doona
Users that are interested in doona are comparing it to the libraries listed below
Sorting:
- Exploits and research stuffs☆56Updated this week
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆99Updated last year
- unix wildcard attacks☆136Updated 7 years ago
- UPnP hacking scripts and tools☆76Updated 8 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 10 years ago
- lulz: automated webstalking tool☆52Updated 9 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 6 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- A shellcode testing harness.☆70Updated last year
- Shell-style script to search exploit-db.com exploits.☆62Updated last year
- A collection of publicly released whitepapers☆49Updated 8 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- ☆86Updated 10 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 9 years ago
- A Java Server Faces (JSF) testing tool for decoding view state and creating view state attack vectors.☆31Updated 14 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Recursively searches a directory for any file containing a specified string☆46Updated 10 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 5 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- A Upnp exploitation tool.☆106Updated 5 years ago
- This repo is all about myself coded exploit codes :)☆54Updated 6 years ago