LetUsFsck / MagicPacketGenerator
This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random networks.
☆38Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for MagicPacketGenerator
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 2 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- Zone transfers for rwhois☆20Updated 5 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Updated 5 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 7 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Screenshot Shenanigans☆25Updated 7 years ago
- AV Bypass☆28Updated 6 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Hostile Dropboxes Management☆25Updated 4 years ago
- web based nmap scan collection and search☆19Updated 3 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- ☆11Updated 5 years ago
- Automatically spin up infra for phishing☆64Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆39Updated 2 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆72Updated 8 years ago
- wordlists for password cracking☆25Updated 2 years ago