zeroSteiner / bandit-ssLinks
☆9Updated 7 years ago
Alternatives and similar repositories for bandit-ss
Users that are interested in bandit-ss are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- ☆27Updated 7 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- tundeep☆42Updated 5 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- ☆17Updated 10 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 9 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago