ArchAssault-Project / archassault
ArchAssault PKGBUILDs
☆44Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for archassault
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- My zsh, bash and vim dot files☆68Updated 5 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 10 years ago
- Simple reverse ICMP shell☆40Updated 11 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 10 years ago
- Basic examples for MITMf☆16Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- Offensives network security framework for Wireless and MiTM style hacking☆60Updated 7 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 10 years ago
- ☆52Updated 8 years ago
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆20Updated 10 years ago
- WPS scan and pwn tool☆66Updated 5 years ago
- Search exploits in multiple exploit databases!☆80Updated 4 years ago
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 5 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 6 months ago
- Fire and forget password cracking and complexity analysis.☆35Updated 8 years ago
- SlyPI☆18Updated 11 years ago
- ssh session type for metasploit☆97Updated last year
- Public Advisories for Security Vulnerabilities.☆25Updated 9 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- huawei mac2wepkey scanner☆16Updated 11 years ago