RedaOps / qr-data-reconstructLinks
Reconstruct files from QR-code video data
☆22Updated 7 years ago
Alternatives and similar repositories for qr-data-reconstruct
Users that are interested in qr-data-reconstruct are comparing it to the libraries listed below
Sorting:
- ANWI - All New Wireless IDS☆28Updated 2 months ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- Rogue AP killer☆91Updated 8 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- Backup scripts I use on my drives.☆25Updated 8 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Updated 6 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆63Updated 7 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 7 years ago
- Express security essentials deployment for Linux Servers☆60Updated 5 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- An opensource project similar to HoneyDocs☆26Updated 10 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Updated 9 years ago
- Truehunter☆30Updated 4 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- ~ BannerGrab☆25Updated 9 years ago
- PoC grabbing IP address behind a VPN - Based of https://github.com/diafygi/webrtc-ips, saves all found addresses for anyone who visits wi…☆36Updated 9 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆159Updated 6 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 7 years ago
- Removed according to regulations☆35Updated 8 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆70Updated 9 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- Telnet Honeypot☆163Updated 6 years ago
- a low-interaction honeypot☆95Updated 8 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago