wybiral / tavern
This is a WIP. Here be dragons.
☆12Updated 5 years ago
Alternatives and similar repositories for tavern:
Users that are interested in tavern are comparing it to the libraries listed below
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆105Updated 5 months ago
- Download files out of open AWS buckets☆37Updated 6 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Updated 4 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated last year
- DirBuster for Node.js☆20Updated 5 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 6 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆34Updated 2 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- my programming / infosec scratchpad☆12Updated last year
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- Executables that execute other stuff☆52Updated 6 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- Easily create Tor hidden services with one command.☆56Updated 8 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Updated 5 years ago
- dev level ;-)☆10Updated 6 years ago
- Utility to generate similar IDN domain names☆48Updated 6 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- ☆13Updated 8 years ago
- "Useable" tool to share secrets via shamir secret sharing and NaCL.☆14Updated 6 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Updated 9 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Word split utility☆13Updated 6 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- Node based express app to ensure privacy online through obfuscation.☆17Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- DNS server limitation mapper☆26Updated 6 years ago