witchdocsec / SUnami
☆8Updated 7 months ago
Alternatives and similar repositories for SUnami:
Users that are interested in SUnami are comparing it to the libraries listed below
- Malicious Macro Generator for LibreOffice/OpenOffice☆24Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆175Updated 7 months ago
- ☆42Updated last year
- Scripts for offensive security☆102Updated last month
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆50Updated last year
- TryHackMe Koth - Shell vs Shell techniques☆31Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆85Updated 7 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆61Updated 4 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆40Updated 7 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆131Updated 7 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆73Updated 4 months ago
- Making your own CTF☆25Updated 4 years ago
- ☆27Updated 7 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆125Updated 7 months ago
- A collection of tools that I use in CTF's or for assessments☆89Updated 2 weeks ago
- some of the commands I usually use when doing HTB machines☆40Updated last year
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆50Updated last month
- Simple Python script that will set up a PHP server for stealing cookies - and provided the payload needed.☆27Updated 3 weeks ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆57Updated 2 months ago
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.☆97Updated 6 months ago
- This is for Ethical Use only!☆29Updated 2 weeks ago
- Simple HTTP listener for security testing☆113Updated 2 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- ☆34Updated last month
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆15Updated 6 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 5 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 5 months ago
- Automated solution for nmap'ing☆27Updated last year