zaf / sipshockLinks
A scanner for SIP proxies vulnerable to Shellshock
☆112Updated 9 years ago
Alternatives and similar repositories for sipshock
Users that are interested in sipshock are comparing it to the libraries listed below
Sorting:
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- Prometheus Firewall Analyzer☆48Updated 10 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- wiwo is a distributed 802.11 monitoring and injecting system that was designed to be simple and scalable, in which all workers (nodes) ca…☆94Updated 10 years ago
- ☆16Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- YAPDNS☆39Updated 10 years ago
- Python SDK to access the vulnerability database☆22Updated 6 years ago
- Some scripts for attacks on Tacacs+ protocol☆66Updated 6 years ago
- Projects and POCs☆61Updated 11 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Updated 10 years ago
- ☆20Updated 2 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Updated 10 years ago
- DNS zone transfer research☆59Updated 9 years ago
- Tool for scanning Cisco router products over SSH☆55Updated 11 years ago
- Masscan integrated with Shodan API☆44Updated 8 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 12 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- Transfer Kippo data to ElasticSearch☆18Updated 10 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Cronbased Dirty Cow Exploit☆30Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago