0x6d616d616e206272696769747465 / NemesisLinks
☆19Updated 8 years ago
Alternatives and similar repositories for Nemesis
Users that are interested in Nemesis are comparing it to the libraries listed below
Sorting:
- Joomla User-Agent/X-Forwarded-For RCE☆17Updated 9 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- A tool to triage screenshots☆20Updated 8 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Updated 8 years ago
- An implementation of the hashcat rules engine in javascript☆49Updated 7 years ago
- Phishing Toolkit☆19Updated 7 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Simple ways to 0wn simple IOT devices☆65Updated 10 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Updated 9 years ago
- Get detailed information about a Twitter user activity☆17Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- ☆52Updated last month
- Sensor software☆68Updated 4 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Updated 12 years ago
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- spectrum monitoring system for GSM providers☆44Updated 10 years ago
- ☆30Updated 5 years ago
- Mainframe bruter and screen automation utility.☆43Updated 11 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Updated 12 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Updated 9 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 10 years ago
- Certificate Expiration Monitor script☆27Updated 7 years ago
- You'll never take me alive.☆85Updated 11 years ago
- ☆16Updated 9 years ago