ANWI - All New Wireless IDS
☆29Aug 3, 2018Updated 7 years ago
Alternatives and similar repositories for anwi
Users that are interested in anwi are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- Pre-OS microcode updater☆43Aug 25, 2018Updated 7 years ago
- Java API for SSL\TLS scanning and reporting☆149Updated this week
- ☆79Aug 4, 2022Updated 3 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Burp extension to help developers replicate findings from pen tests☆70Jul 22, 2024Updated last year
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆211Nov 16, 2018Updated 7 years ago
- ☆137Mar 20, 2019Updated 7 years ago
- Open source Active Directory security audit framework.☆137Jan 15, 2018Updated 8 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 8 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- DejaVU - Open Source Deception Framework☆426Aug 2, 2025Updated 7 months ago
- Collecting & Hunting for IOCs with gusto and style☆241Aug 1, 2021Updated 4 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆425Mar 13, 2026Updated 2 weeks ago
- Mallet is an intercepting proxy for arbitrary protocols☆289Apr 14, 2025Updated 11 months ago
- First IDE for Nmap Script (NSE) Development.☆359Aug 8, 2020Updated 5 years ago
- snake - a malware storage zoo☆217Jul 11, 2023Updated 2 years ago
- Graphical Realism Framework for Industrial Control Simulations☆226Jun 20, 2024Updated last year
- A Bypass waF Scanner☆30Dec 14, 2018Updated 7 years ago
- A Microservices-based framework for the study of Network Security and Penetration Test techniques☆629Mar 13, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Jan 5, 2018Updated 8 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆214Jun 23, 2020Updated 5 years ago
- 本项目仅用于记录团队内部分享议题及一些大事件,记录团队成长的过程。☆10Apr 2, 2019Updated 6 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆484Jul 27, 2019Updated 6 years ago
- POC for utilizing wikipedia API for Command and Control☆28Dec 8, 2022Updated 3 years ago
- nmap模块扫描端口服 务后,调用对应的exp检测☆12Jun 9, 2018Updated 7 years ago
- ☆34Nov 4, 2018Updated 7 years ago
- Puma Scan is a software security Visual Studio extension that provides real time, continuous source code analysis as development teams wr…☆448Oct 28, 2022Updated 3 years ago
- Some tools based on docker☆24Jul 28, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆46May 15, 2016Updated 9 years ago
- Parse and stringify URL query strings☆13Aug 1, 2018Updated 7 years ago
- Python implementation of RSA reverse shell.☆11Dec 31, 2016Updated 9 years ago
- A Bluetooth low energy capture the flag☆751Updated this week
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Burp Suite plugin identifies insertion points for GWT (Google Web Toolkit) requests☆13Sep 24, 2015Updated 10 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago