CriticalSecurity / welockLinks
☆28Updated 4 years ago
Alternatives and similar repositories for welock
Users that are interested in welock are comparing it to the libraries listed below
Sorting:
- ☆23Updated last year
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated 5 months ago
- A tiny set of helper scripts for ipinfo☆17Updated 5 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated last month
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆11Updated last year
- A static website template for security pages.☆52Updated 4 months ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆17Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.☆90Updated 3 years ago
- ☆17Updated 4 years ago
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- Cryptanalysis and attack library☆22Updated 3 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated 3 weeks ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 3 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 3 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆19Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Remove password-protection from a PDF-document permanently.☆50Updated 7 years ago
- NAT Slipstream attack code samples☆48Updated 4 years ago
- Simple S3 Bucket Testing Software☆31Updated 4 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆88Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 11 months ago