0x6d616d616e206272696769747465 / NemesisLinks
☆19Updated 7 years ago
Alternatives and similar repositories for Nemesis
Users that are interested in Nemesis are comparing it to the libraries listed below
Sorting:
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Updated 8 years ago
- ☆27Updated 8 years ago
- You'll never take me alive.☆85Updated 11 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated last year
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 8 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Updated 7 years ago
- A tool to triage screenshots☆20Updated 8 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- ☆50Updated last week
- Here comes the paintrain!☆11Updated 9 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 10 years ago
- Phishing Toolkit☆20Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Updated 9 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- ☆30Updated 5 years ago
- ☆16Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago