Advanced Network Interface Management and Monitoring
☆33Jan 6, 2024Updated 2 years ago
Alternatives and similar repositories for MacMaster
Users that are interested in MacMaster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- PassBreaker☆67Apr 5, 2024Updated 2 years ago
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- ICMPWatch: ICMP Packet Sniffer☆57Oct 15, 2024Updated last year
- NetProbe: Network Probe☆174Oct 13, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- NetworkSherlock: powerful and flexible port scanning tool With Shodan☆115Jun 24, 2025Updated 9 months ago
- Enumerate typosquatting, IDN homograph, bitsquatting, and visual spoofing candidates for red team engagements, threat hunting, and brand …☆11Mar 28, 2026Updated 2 weeks ago
- Launcher de Minecraft que permite administrar múltiples instalaciones y versiones.☆10Apr 13, 2022Updated 3 years ago
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- Identify the accounts most vulnerable to dictionary attacks☆121Apr 2, 2025Updated last year
- ☆56Jan 22, 2025Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- Blip management for qb and esx.☆12Jan 14, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- CryptChat: Beyond Secure Messaging 🛡️☆72Nov 15, 2023Updated 2 years ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- BBT - Bug Bounty Tools☆18Apr 5, 2024Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- keep watching new bug bounty (vulnerability) postings.☆11Apr 7, 2024Updated 2 years ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆266Dec 15, 2025Updated 3 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆52Feb 22, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- RansomwareSim is a simulated ransomware☆172May 31, 2024Updated last year
- An chroot-like implementation using ptrace.☆17Oct 23, 2019Updated 6 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques☆17Jan 29, 2022Updated 4 years ago
- A fast subdomain takeover tool☆86Mar 31, 2026Updated last week
- A small and dirty python3 based script to download courses from Infosec Institute.☆12Oct 6, 2021Updated 4 years ago
- Termux packages that are only usable by root users.☆26May 9, 2020Updated 5 years ago
- Use setupTermuxArch.sh 📲 to install Arch Linux in Termux on Android, Chromebook and Fire OS. This setup script will attempt to set Arch …☆20Jan 29, 2018Updated 8 years ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated last year
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Powerful & Generic Tools For Ethical Hacking Purposes. Please use for Educational Purposes And Use Metasploitable For Testing & Practicin…☆12Feb 1, 2020Updated 6 years ago
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago