Pinperepette / plsLinks
Utility alternative to ls
☆14Updated 3 years ago
Alternatives and similar repositories for pls
Users that are interested in pls are comparing it to the libraries listed below
Sorting:
- zero-trust remote firewall instrumentation☆251Updated last year
- A fast and secure multi protocol honeypot.☆323Updated 2 years ago
- Combining the powers of endlessh and fail2ban.☆193Updated 3 years ago
- Auto discover and exploit LAN raspberry pi's☆108Updated last year
- Test a phone for stalkerware using adb and usb debugging to scan for suspicious apps and configuration☆125Updated 2 months ago
- ☆147Updated 3 years ago
- (⌐■_■) - API server for pwnagotchi.ai☆154Updated 2 years ago
- List of the most common French passwords☆364Updated last year
- Pipeline 0 del progetto con definizione tecnica del Perimetro Cibernetico Italiano☆15Updated 5 years ago
- SSH proxy with HASSH firewalling capabilities☆28Updated 5 years ago
- D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed b…☆203Updated last year
- bettercap's web UI☆344Updated 2 weeks ago
- Official collection of HackInBo® talks, slides, and event programs.☆82Updated last month
- Capture traffic, export TLS keys, upload to CloudShark☆68Updated 6 years ago
- CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.☆74Updated last year
- The pocket-sized wireless sniffer☆219Updated 4 years ago
- Bluetooth Network Access Point☆165Updated 8 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆656Updated 10 months ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆123Updated last week
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆216Updated 5 years ago
- The simplest way to find how to report abusive domains☆55Updated 2 years ago
- Capture handshakes of nearby WiFi networks automatically☆763Updated 4 years ago
- A simple tool to generate fake web browsing and mitigate tracking☆286Updated 9 months ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. c.f., http://foremost.sourc…☆53Updated 12 years ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆27Updated 7 years ago
- Polskie rozszerzenie OSINT framework - Polish extension of OSINT framework☆55Updated last week
- ☆37Updated 3 years ago
- ☆127Updated 6 years ago
- SMTP&SNMP&SMB honeypot☆57Updated 3 months ago
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆175Updated last year