Command line tool for macaddress.io API.
☆12Dec 11, 2018Updated 7 years ago
Alternatives and similar repositories for maclookup-cli
Users that are interested in maclookup-cli are comparing it to the libraries listed below
Sorting:
- Arduino SPI Library for AS3935 Lightning Sensor☆11Jul 15, 2018Updated 7 years ago
- True peer to peer VOIP and messaging application with encrypted communication☆11Sep 26, 2014Updated 11 years ago
- ☆12Dec 18, 2024Updated last year
- AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!☆15Jan 11, 2020Updated 6 years ago
- Example on how to use web3.swift. https://github.com/MercuryProtocol/web3.swift☆17Feb 2, 2018Updated 8 years ago
- ☆14Jan 2, 2024Updated 2 years ago
- Zabbix template for DmOS Datacom network equipments☆14Sep 19, 2025Updated 6 months ago
- CROSS PLATFORM MULTI NETCAT SERVER☆12Sep 17, 2025Updated 6 months ago
- Curso para Semana de Capacitação 11 - NIC.br☆23Sep 15, 2025Updated 6 months ago
- Open source client for connecting to Mikrotik routers via MAC address☆21Mar 2, 2023Updated 3 years ago
- nmap nse script for scan a whole country☆13Jun 28, 2022Updated 3 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- CryDecryptor is an Android application to decrypt files from device compromised by the CryCryptor ransomware☆15Jul 2, 2020Updated 5 years ago
- Study into generating POC / Exploits for the metasploit framework using LLMs☆13Aug 27, 2023Updated 2 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 7 months ago
- Arduino I2C Library for AS3935 Lightning Sensor☆23May 8, 2025Updated 10 months ago
- AlphaTracker is a computer vision pipeline with the practical and real-time advantages , which requires minimal hardware requirements and…☆13Jan 10, 2023Updated 3 years ago
- A Machine Learning based tool for identifying P2P (Peer To Peer) Bot-Nets using network traffic analysis, as well as detect the hosts inv…☆12Jan 4, 2023Updated 3 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- NMAP with LLM summaries☆16Jan 15, 2024Updated 2 years ago
- Convert MHTM file to single html embedded all resources with base64 encoding☆10Jan 7, 2019Updated 7 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- E2E encrypted ephemeral messaging app. Share secrets securely without setup. Built with Next.js, Soketi, and OpenPGP.js. Self-hostable.☆11Sep 16, 2024Updated last year
- ☆22Dec 19, 2024Updated last year
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- A command-line bookmark manager☆13Apr 14, 2018Updated 7 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Dec 24, 2014Updated 11 years ago
- Simple CLI-oriented utility to test proxies☆19Oct 24, 2020Updated 5 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- A script to split up big ics files☆24Dec 7, 2023Updated 2 years ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- fork of myevic firmware for tubo project☆11Apr 23, 2018Updated 7 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- BinView is a prototype for an application for binary data visualization. It can be used for analyzing large binary blocks and/or files, a…☆14Feb 16, 2015Updated 11 years ago
- Convert MIDI files to Serum and Vital LFOs.☆13Aug 31, 2023Updated 2 years ago
- AS3935 Franklin Lightning Sensor™ IC by AMS Arduino library☆48Jul 23, 2014Updated 11 years ago
- ☆47Updated this week