Pinperepette / plsLinks
Utility alternative to ls
☆14Updated 4 years ago
Alternatives and similar repositories for pls
Users that are interested in pls are comparing it to the libraries listed below
Sorting:
- (⌐■_■) - API server for pwnagotchi.ai☆161Updated 2 years ago
- generate videos with subtitles☆28Updated last year
- zero-trust remote firewall instrumentation☆255Updated this week
- Official collection of HackInBo® talks, slides, and event programs.☆84Updated last month
- RasPwn OS☆65Updated 8 years ago
- Auto discover and exploit LAN raspberry pi's☆108Updated last year
- The pocket-sized wireless sniffer☆222Updated 4 years ago
- PMK and PMKID database☆84Updated 2 weeks ago
- A tool for processing a lot of pcaps using tshark☆155Updated 2 years ago
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆182Updated last year
- bettercap's web UI☆356Updated 5 months ago
- Distributed WPA PSK auditor☆346Updated 7 months ago
- Apple geolocation services reverse engineering. Database scraper.☆65Updated 2 years ago
- packet captures of real-world ddos attacks☆165Updated 3 months ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-host…☆134Updated last week
- 📈 SecKC Honeypot dashboard☆18Updated 8 years ago
- Implementation of an evil maid attack against Linux's most popular full-disk encryption tool☆28Updated 7 years ago
- List of useful things☆83Updated this week
- ☆147Updated 4 years ago
- Capture traffic, export TLS keys, upload to CloudShark☆69Updated 6 years ago
- ☆201Updated 4 years ago
- ☆128Updated 3 years ago
- Mobile UI for kismet☆183Updated last year
- Mark pre-Musk era Twitter actually verified accounts.☆116Updated 3 years ago
- Pipeline 0 del progetto con definizione tecnica del Perimetro Cibernetico Italiano☆15Updated 6 years ago
- D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed b…☆210Updated last year
- Auth.log parser☆47Updated 7 years ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆218Updated 3 years ago
- Probe codebase of RIPE Atlas, a global network measuring Internet connectivity and reachability☆320Updated 2 months ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆308Updated 9 months ago