Stupid MQTT Brute Forcer
☆32Jul 27, 2017Updated 8 years ago
Alternatives and similar repositories for joffrey
Users that are interested in joffrey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Oct 23, 2019Updated 6 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- Flash最新钓鱼源码对接官方API实现跟随官方升级而升级☆12Sep 30, 2020Updated 5 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 基于websocket的浏览器推送服务器☆11Oct 12, 2017Updated 8 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 9 years ago
- ☆14Jun 19, 2017Updated 8 years ago
- The contract's source code of SOC☆10Mar 17, 2021Updated 5 years ago
- 甲方企业安全建设开源之路☆10Oct 11, 2018Updated 7 years ago
- Some Of Huawei Routers Exploits☆15Sep 1, 2016Updated 9 years ago
- 灵芝IAST是一款交互式应用安全评估工具,覆盖了Java WEB相关安全风险的检测,具有近实时检测、准确率高、误报率低、漏洞链路清晰等特点|使用之前请阅读官方文档☆16Jul 18, 2020Updated 5 years ago
- CentOS Control Web Panel, Root Privilege Escalation☆68Oct 25, 2019Updated 6 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- X41 BeanStack - Stack Trace Fingerprinting BETA☆54Dec 3, 2025Updated 4 months ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- Residence插件中文Wiki☆10Aug 12, 2018Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- 【Nextcloud】腾讯云对象存储(COS)功能☆13Sep 2, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆85Dec 6, 2019Updated 6 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)☆22Feb 28, 2021Updated 5 years ago
- minepeon-base☆24Jul 2, 2014Updated 11 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- A SIEM inspired by HECTOR, built on Django.☆27Apr 16, 2019Updated 7 years ago
- ER Mail is an e-mail client that can help you to assemble related emails into an aggregated view so that there is no need for you to clic…☆12Jul 29, 2018Updated 7 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Jan 5, 2022Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python automation of Docker.sock abuse☆211Dec 8, 2022Updated 3 years ago
- ☆14May 14, 2018Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- “谛听”(discern)资产识别分析平台,一个简化版的物联网设备信息安全搜索引擎,IOT—Scanner的迭代优化版本。目前集成了主机发现、端口扫描、设备识别、漏洞匹配、poc验证等功能。☆17Feb 6, 2021Updated 5 years ago
- PoC of CVE-2022-20474☆19Feb 3, 2025Updated last year
- ☆10Aug 18, 2021Updated 4 years ago