AllGloryToTheHypnotoad / nodescanLinks
scans network for hosts and open ports
☆31Updated 7 years ago
Alternatives and similar repositories for nodescan
Users that are interested in nodescan are comparing it to the libraries listed below
Sorting:
- ☆61Updated 7 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 7 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Updated 6 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Send ARP packets and read ARP tables using Javascript☆84Updated 4 years ago
- Sensors for the datacenter to protect against intruders and high temperatures☆18Updated 8 years ago
- NPM package for interfacing with local NMAP installation☆67Updated last year
- pyCryptoCat - A CryptoCat standalone python client.☆35Updated 11 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- Universal MITM web server☆107Updated 8 years ago
- Shell script to create an onion-router for your Raspberry Pi from a stock Moebius image☆28Updated 10 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- A python script for obfuscating wireless networks☆78Updated 8 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆37Updated 9 years ago
- Pentesting framework using Node.js powers, focused in VoIP.☆262Updated 8 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆17Updated 10 years ago
- Auto Reaver - multiple access point attack using Reaver☆53Updated 8 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- ☆63Updated 12 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- DirBuster for Node.js☆20Updated 6 years ago
- Multi-client, multi-threaded reverse shell handler written in Node.js☆74Updated 2 years ago
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆21Updated 11 years ago
- Credentials recovery project☆6Updated 10 years ago