CriticalSecurity / welockLinks
☆27Updated 4 years ago
Alternatives and similar repositories for welock
Users that are interested in welock are comparing it to the libraries listed below
Sorting:
- ☆23Updated last year
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- Linksys Smart Wi-fi X-JNAP-Action Sensitive Information Disclosure for EA8500 router and potentially others☆19Updated 4 years ago
- Fast dns resolver☆13Updated last year
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- A wrapper around ripgrep to check for various common patterns.☆13Updated 5 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- ☆42Updated 3 months ago
- ☆17Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆10Updated last year
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- ☆10Updated 7 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Request Smuggling Firewall☆52Updated 4 years ago