CriticalSecurity / welockLinks
☆27Updated 4 years ago
Alternatives and similar repositories for welock
Users that are interested in welock are comparing it to the libraries listed below
Sorting:
- ☆23Updated last year
- A tiny set of helper scripts for ipinfo☆17Updated 5 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- A fast GitHub stargazers information gathering tool☆73Updated 3 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆87Updated 11 months ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 5 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆45Updated this week
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- A static website template for security pages.☆53Updated 2 months ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆11Updated last year
- ☆17Updated 3 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Updated 3 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 3 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Updated last year
- Decryption utility for PGP Whole Disk Encryption☆20Updated 4 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 3 months ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 10 months ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 3 years ago
- Grep Web pages with extra features like JS deobfuscation and OCR☆110Updated last year
- Linksys Smart Wi-fi X-JNAP-Action Sensitive Information Disclosure for EA8500 router and potentially others☆20Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- Network Traffic Fuzzer☆18Updated 8 months ago