Hood3dRob1n / OhNo
OhNo - The Evil Image Builder & Meta Manipulator
☆12Updated 10 years ago
Alternatives and similar repositories for OhNo:
Users that are interested in OhNo are comparing it to the libraries listed below
- Note:- Run this Script in root user.☆16Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- web information gathering / Grab links☆42Updated 5 years ago
- Automation Hacking & Penetration Testing Suite☆10Updated 8 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- MS17-010☆12Updated 7 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆30Updated 11 years ago
- Automated Mass Exploiter☆12Updated 5 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 9 years ago
- ☆19Updated 9 years ago
- ☆19Updated 7 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 6 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- ☆13Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 6 years ago
- Python tool for Dorking☆11Updated last year
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 10 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 6 years ago