RedaOps / qr-data-reconstructLinks
Reconstruct files from QR-code video data
☆22Updated 7 years ago
Alternatives and similar repositories for qr-data-reconstruct
Users that are interested in qr-data-reconstruct are comparing it to the libraries listed below
Sorting:
- Express security essentials deployment for Linux Servers☆59Updated 4 years ago
- Truehunter☆31Updated 4 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Rogue AP killer☆90Updated 7 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- DNS Botnet Server and Client☆35Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 2 years ago
- ANWI - All New Wireless IDS☆28Updated 6 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- Transfer files from Air gapped machines using QR codes☆110Updated 4 years ago
- Removed according to regulations☆35Updated 8 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆84Updated 5 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- A command line tool to detect new unknown device in your network using ARP protocol☆111Updated 7 years ago
- Simple website to display the LAN status based on a nmap scan☆58Updated 2 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- Files related to our research on ShadowHammer☆23Updated 4 years ago
- Leak File Analyzer☆62Updated 7 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆160Updated 2 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆52Updated 2 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 10 years ago
- IPv6 address spoofing with the Neighbor Discovery Protocol☆53Updated 7 years ago
- IMAJS meet <img>☆54Updated 10 years ago
- SSH, FTP and Telnet honeypots based on Twisted☆86Updated 5 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆119Updated 7 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆67Updated 6 years ago
- Centralized Firewall Control☆21Updated 7 years ago