Simple (but working) WEP/WPA/WPA2 Hacking script
☆29Apr 2, 2016Updated 9 years ago
Alternatives and similar repositories for DWH
Users that are interested in DWH are comparing it to the libraries listed below
Sorting:
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- Auto Updater Joomla Components and Exploits Scanner☆27Apr 1, 2018Updated 7 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆14Jul 6, 2025Updated 7 months ago
- To create awareness and educate people about the browser fingerprint, I have created this website, which provides a visual representation…☆16Nov 21, 2025Updated 3 months ago
- Vulnerability Scanner☆11Dec 23, 2014Updated 11 years ago
- Distributed WPA/WPA2 cracker☆16Mar 23, 2015Updated 10 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- scripts, snippets etc.☆24Jul 17, 2025Updated 7 months ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- Project about minimizing costs in garbage collection in Montevideo, Uruguay, using Evolutionary Algorithms☆18Mar 27, 2023Updated 2 years ago
- An implementation of the concepts behind the Logjam attack☆16May 1, 2016Updated 9 years ago
- Android library that provides a file explorer to let users select files on external storage. This fork does not depend on Fragments.☆15Aug 21, 2014Updated 11 years ago
- Linset is a WPA/WPA2 phishing tool (evil twin)☆144Oct 6, 2023Updated 2 years ago
- Let's try to create a rootkit!☆19Mar 6, 2020Updated 5 years ago
- Reverse Shell over TCP backdoor☆50Feb 8, 2019Updated 7 years ago
- Termux bomb for OS - Android and IOS☆10Jul 16, 2020Updated 5 years ago
- Tools untuk bypass Verifikasi WhatsApp☆28Apr 27, 2019Updated 6 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,914Apr 13, 2022Updated 3 years ago
- My collection of unpackers for malware packers/crypters☆28Aug 24, 2017Updated 8 years ago
- Back of the Envelope Thermal Analysis☆13Aug 6, 2021Updated 4 years ago
- XXX-O-DUS Scraper Development for Kodi - Kodi is a registered trademark of the XBMC Foundation. We are not connected to or in any other w…☆18Aug 27, 2017Updated 8 years ago
- Track IP Location☆11Dec 23, 2018Updated 7 years ago
- Javascript DE-Obfuscator used to deobfuscate JS generated by javascriptobfuscator.com☆11Mar 6, 2020Updated 5 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- Scripts to create an Image of Debian for Olimex Lime / Lime 2☆11Jan 18, 2015Updated 11 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- A set of HTML code demonstrations☆26Sep 1, 2020Updated 5 years ago
- Your last stop for password list generation needs!☆27Mar 4, 2015Updated 11 years ago
- SCTP network scanner for discovery and security☆94Sep 17, 2021Updated 4 years ago
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- Home of the getBible component for Joomla 3.x☆11Jan 16, 2017Updated 9 years ago
- Bitcoin Hardware Wallet Interaction scripts☆11Jan 30, 2026Updated last month
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Bot to bypass instagram block feature☆10Jun 21, 2017Updated 8 years ago
- custom LinkedIn Search☆11Nov 28, 2018Updated 7 years ago
- Infrastructure Bot for your organization☆10Jun 9, 2025Updated 8 months ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Oct 7, 2019Updated 6 years ago