Automatic USB drive malware scanning tool for the security-minded person
☆96Sep 14, 2016Updated 9 years ago
Alternatives and similar repositories for WAS
Users that are interested in WAS are comparing it to the libraries listed below
Sorting:
- A USB phishing evaluation platform☆46Oct 15, 2015Updated 10 years ago
- Exploits USB HID to steal passwords saved in Google Chrome☆70Sep 17, 2017Updated 8 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆101Apr 25, 2017Updated 8 years ago
- Automatically hacking usb stick (gets passwords + keylogger)☆249Mar 11, 2019Updated 6 years ago
- A Stealthy Trojan Spyware☆1,170Oct 20, 2025Updated 4 months ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- Truehunter☆30May 15, 2021Updated 4 years ago
- UDPack is an extensible generic UDP packet obfuscator.☆21Jul 27, 2019Updated 6 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Telegram Bug Bounty Bot☆32Jan 3, 2017Updated 9 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆45Dec 24, 2018Updated 7 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆100Aug 26, 2019Updated 6 years ago
- Script hecho en python, para sacar la IP, de las paginas web.☆11Aug 25, 2022Updated 3 years ago
- Generate reverse shells in command line with Go !☆20Aug 9, 2020Updated 5 years ago
- gui tool to create normal payload by msfvenom☆34Dec 26, 2018Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Exfiltration based on custom X509 certificates☆26Feb 23, 2024Updated 2 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- AVR Bus-Pirate-a-like☆90Mar 5, 2023Updated 3 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Sep 20, 2022Updated 3 years ago
- Coleção de informações sobre POS's disponíveis no mercado Brasileiro, com propósito educativo.☆11Sep 6, 2020Updated 5 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- An Android wrapper for Arc☆11May 13, 2018Updated 7 years ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago