Gets in the way of your victim's traffic and out of yours
☆27Aug 4, 2019Updated 6 years ago
Alternatives and similar repositories for Lauschgeraet
Users that are interested in Lauschgeraet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple shell script to "clone" X.509 certificates☆116Mar 31, 2025Updated last year
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago
- A simple script to make network namespaces more usable☆23Oct 18, 2019Updated 6 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- LDAP Swiss Army Knife☆52Dec 5, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PoC tool to demonstrate vulnerabilities in wireless input devices☆88Mar 24, 2017Updated 9 years ago
- Siemens LOGO!8 PLC Password Hacking Proof-of-Concept-Tool☆43Oct 19, 2022Updated 3 years ago
- Source code for the StealthAssist iOS app. Wirelessly connects your iPhone to the Valentine One radar detector.☆16Oct 17, 2015Updated 10 years ago
- Perl script to bruteforce SSH known_hosts files.☆25Jun 9, 2015Updated 10 years ago
- Generates IP, while Excluding/Including specific IP blocks. Useful in Mass Scanning.☆24Dec 24, 2014Updated 11 years ago
- Lightweight, Portable, Phishing and Email Campaign Utility☆13Oct 15, 2018Updated 7 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆176Mar 30, 2022Updated 4 years ago
- A web app scanner☆24Jan 23, 2014Updated 12 years ago
- A variation of the IKE-SCAN user guide's transforms discovery script, adding a few features. Handshakes can be done in Main or Aggressive…☆13Jul 4, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- vncsnapshot☆14Mar 23, 2012Updated 14 years ago
- IPV6 MITM attack tool☆92Aug 7, 2013Updated 12 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- DDoS Attack - Script Python 2☆14May 12, 2018Updated 7 years ago
- Matomo Opt-Out Javascript without iframe and without cookies☆16Dec 22, 2021Updated 4 years ago
- android proxy setting tool☆43Jul 2, 2021Updated 4 years ago
- Mega🅱️lock☆16Nov 1, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Simply insert your Yubikey and connect automatically to your TOTP-2FA-VPN.☆16Nov 19, 2025Updated 5 months ago
- Driving one of those cheap RF1101SE boards with a Arduino or Teensy☆17Nov 16, 2016Updated 9 years ago
- KeeLoQ compatible Transmitter using ATTiny85☆13Jan 19, 2024Updated 2 years ago
- 📩 Simple Docker image that runs imap-backup with crontab☆13Jan 14, 2023Updated 3 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Apr 30, 2019Updated 7 years ago
- Hydradancer firmware supporting the Facedancer backend for the Hydradancer dongle and HydraUSB3☆24Dec 10, 2025Updated 4 months ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- Setup script for Red Teams☆14Apr 7, 2025Updated last year
- CVE-2018-18368 SEP Manager EoP Exploit☆17Nov 27, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,453Nov 20, 2025Updated 5 months ago
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Feb 19, 2019Updated 7 years ago
- All TMF files that I extracted from Microsoft PDBs.☆14Jun 29, 2019Updated 6 years ago
- The BlackAlps 2019 badge☆10Dec 4, 2021Updated 4 years ago
- Relay Attack☆12Jul 16, 2020Updated 5 years ago
- A minimal DNS service that can provide spoofed replies☆102Apr 24, 2023Updated 3 years ago
- Continuous Rust Fuzzing Example☆15Aug 4, 2020Updated 5 years ago