Playing with IPv6 for fun and profit
☆123Apr 12, 2021Updated 4 years ago
Alternatives and similar repositories for IPv6
Users that are interested in IPv6 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆210Nov 16, 2018Updated 7 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Various exploits, metasploit modules, etc.☆15Jun 3, 2016Updated 9 years ago
- ☆22Mar 5, 2018Updated 8 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- CLI tool and python module which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc.☆50Feb 7, 2026Updated last month
- OpenVZ Container Backup - for containers using ploop storage☆34Jan 19, 2018Updated 8 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆10Oct 9, 2016Updated 9 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆132Aug 10, 2021Updated 4 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- ☆57May 13, 2020Updated 5 years ago
- Heartbleed test script for OpenVPN☆34Apr 10, 2014Updated 11 years ago
- A XPath injection demonstration application☆21Nov 14, 2020Updated 5 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆116Feb 26, 2020Updated 6 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Library to test all fields of a python dictionary☆12Mar 28, 2018Updated 7 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- Radamsa fuzzer extension for Burp Suite☆23Jun 25, 2013Updated 12 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Sep 4, 2015Updated 10 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆183Jun 10, 2022Updated 3 years ago
- Using "svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc" as trigger☆58Oct 7, 2020Updated 5 years ago