A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.
☆25Aug 14, 2017Updated 8 years ago
Alternatives and similar repositories for Installer
Users that are interested in Installer are comparing it to the libraries listed below
Sorting:
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Mar 6, 2019Updated 6 years ago
- Metasploit Framework☆26Feb 10, 2026Updated 3 weeks ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- NG-NetMS is a new end-to-end network management platform for your Linux servers, Cisco, Juniper, HP and Extreme routers, switches and fir…☆40Dec 5, 2017Updated 8 years ago
- Secure approach to secure file storage in untrusted environments.☆35Mar 26, 2019Updated 6 years ago
- OSINT tool for testing privacy and social engineering vulnerability of organizations.☆93Jul 1, 2019Updated 6 years ago
- Session Manager and Middleware for Go net/http☆11Feb 11, 2025Updated last year
- Sensor software☆68Oct 14, 2021Updated 4 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 8 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Jun 14, 2016Updated 9 years ago
- Show Exploit-Database With Static HTML Automatic Generate Everyday.☆13Jun 13, 2021Updated 4 years ago
- Short tutorial how to use Tails in a more fancy way.☆10Mar 22, 2021Updated 4 years ago
- Extract Sense out of Gibberish stuff☆81May 11, 2017Updated 8 years ago
- ☆11Apr 28, 2017Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- Anonymous FTP Scanner Script- Generates IP's between two ranges, scans 21 and attempts a anonymous connection☆10Nov 23, 2014Updated 11 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- kCFI Documentation☆15Apr 18, 2017Updated 8 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆104Jun 1, 2018Updated 7 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Chat with hacker assistant☆194Dec 28, 2017Updated 8 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆166Sep 14, 2024Updated last year
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆248Nov 11, 2020Updated 5 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago