3vangel1st / kamerkaView external linksLinks
Build interactive map of cameras from Shodan
☆23Jan 17, 2020Updated 6 years ago
Alternatives and similar repositories for kamerka
Users that are interested in kamerka are comparing it to the libraries listed below
Sorting:
- Yara rules☆10Dec 10, 2019Updated 6 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆17Jan 8, 2021Updated 5 years ago
- A Torrent Magnet Link Scrapper☆14Dec 4, 2019Updated 6 years ago
- cve-2019-11931☆35Nov 16, 2019Updated 6 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆41Oct 13, 2020Updated 5 years ago
- RedTeam - Red Team Tools☆48Oct 30, 2022Updated 3 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- ☆19Feb 15, 2022Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- XXE Injection Payloads☆28Jul 30, 2019Updated 6 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆49Dec 6, 2020Updated 5 years ago
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Aug 19, 2020Updated 5 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Apr 24, 2018Updated 7 years ago
- Simple and convenient software for hacking other people's cams☆29Dec 11, 2017Updated 8 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- HadoopLink是基于Hadoop及BaseMR进一步封装而来的工作链框架。该框架省去了您生成Job,JobControl,ContrlledJob的繁杂重复代码。同时您可以非常便捷的通过注释设置MapReduce任务之间的依赖关系。HadoopLink支持多个任务链并…☆11Sep 2, 2019Updated 6 years ago
- Back of the Envelope Thermal Analysis☆13Aug 6, 2021Updated 4 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 6 years ago
- A React Native video component with controls☆12Apr 15, 2021Updated 4 years ago
- A companion Cypress plugin for `cy-grep` that allows user to run specific test(s) in `open` mode.☆12Updated this week
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Scanning in the middlelayer, v2☆10Updated this week
- ☆15Jul 30, 2022Updated 3 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- ipmap is an open source, cross-platform and powerful network analysis tool.☆12Dec 11, 2025Updated 2 months ago
- instagram bot reports spam☆10Oct 19, 2020Updated 5 years ago
- LFI/RFI Payload Tests Project☆36Oct 21, 2019Updated 6 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆44Sep 18, 2019Updated 6 years ago
- X-Forwarded-For [403 forbidden] enumeration☆99May 3, 2024Updated last year
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- Simple storage for stock prices with adjusted prices calculation based on Center for Research in Security Prices (CRSP) standards☆12Feb 15, 2018Updated 8 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 11 years ago
- A super dope tool, that generates "corrupted" .PDF files of randomly unique file sizes (no two files of the same size or byte combination…☆14Oct 12, 2021Updated 4 years ago