Gets in the way of your victim's traffic and out of yours
☆27Aug 4, 2019Updated 6 years ago
Alternatives and similar repositories for Lauschgeraet
Users that are interested in Lauschgeraet are comparing it to the libraries listed below
Sorting:
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago
- A simple script to make network namespaces more usable☆22Oct 18, 2019Updated 6 years ago
- Simple shell script to "clone" X.509 certificates☆116Mar 31, 2025Updated 11 months ago
- Simple voltage glitcher implementation for the iCEBreaker FPGA board☆18Mar 2, 2020Updated 6 years ago
- A collection of pen-testing/hacking scripts. Various uses.☆13Oct 24, 2020Updated 5 years ago
- Perl script to bruteforce SSH known_hosts files.☆25Jun 9, 2015Updated 10 years ago
- Notes for the AWS SysOps Associate exam.☆11Apr 14, 2019Updated 6 years ago
- Siemens LOGO!8 PLC Password Hacking Proof-of-Concept-Tool☆43Oct 19, 2022Updated 3 years ago
- Generates IP, while Excluding/Including specific IP blocks. Useful in Mass Scanning.☆24Dec 24, 2014Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- LDAP Swiss Army Knife☆51Dec 5, 2023Updated 2 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- CRUD básico em PHP com um sistema de cadastro de clientes.☆13May 19, 2021Updated 4 years ago
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- 50 React projects for beginners from easy to hard. Practice all of these projects to excel your React skills.☆12Sep 5, 2022Updated 3 years ago
- ☆11Feb 21, 2026Updated 2 weeks ago
- Código fonte da calculadora de IMC☆13Oct 16, 2019Updated 6 years ago
- Offensive security framework combining 70+ tools for network reconnaissance, OSINT, WiFi attacks, credential cracking, exploitation & tra…☆23Jan 3, 2026Updated 2 months ago
- intern☆10Sep 25, 2018Updated 7 years ago
- ☆11Aug 17, 2025Updated 6 months ago
- ☆15Aug 21, 2021Updated 4 years ago
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆86Mar 24, 2017Updated 8 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- BlackArch configuration for the bash shell.☆13Jan 11, 2021Updated 5 years ago
- ☆10Aug 12, 2024Updated last year
- ☆11Jan 31, 2017Updated 9 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Lightweight, Portable, Phishing and Email Campaign Utility☆13Oct 15, 2018Updated 7 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- ☆10May 9, 2019Updated 6 years ago
- 2D Platformer made using the Pygame Library☆10Jan 6, 2021Updated 5 years ago
- Blog do grupo gufers☆12Sep 30, 2022Updated 3 years ago
- ☆10Dec 7, 2015Updated 10 years ago
- ☆11Mar 12, 2020Updated 5 years ago
- pwsh native host experiment☆12Jun 7, 2021Updated 4 years ago
- For the 2:5 Scale KENBAK-1 Personal Computer Reproduction☆12Jul 6, 2025Updated 8 months ago