xPaw / HTTPsysLinks
🔥 A checker site for MS15-034 / CVE-2015-1635
☆39Updated 10 years ago
Alternatives and similar repositories for HTTPsys
Users that are interested in HTTPsys are comparing it to the libraries listed below
Sorting:
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- A PoC for exploiting Guzzle's HTTP_PROXY untrusted read☆55Updated 9 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 10 years ago
- AutoBrowser Screenshot☆49Updated 9 years ago
- LNHG - Mass Web Fingerprinter☆63Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- A script that inspects multi-byte character sets looking for characters with specific user-defined properties☆27Updated 9 years ago
- everything that does not fit elsewhere☆12Updated 8 years ago
- library and intepreter for penetration testing tools☆30Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 10 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- ☆71Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Hackerone disclosed report URL Aggregator☆30Updated 7 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Unix remote login tool, rootkit shell tool☆32Updated 10 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- ☆54Updated 9 years ago
- ☆73Updated 12 years ago
- DNS rebinding is powerful: how to steal WiFi passwords by just tricking a victim into visiting a website, thanks to that fancy Bang & Olu …☆81Updated 6 years ago
- Exploits and research stuffs☆54Updated 2 weeks ago