TheFlash2k / methLinks
Packet Sniffer with capabilities to sniff raw tcp, udp, http, icmp, ftp, ssh, sftp packets and filter them using berkley filters
☆11Updated 4 years ago
Alternatives and similar repositories for meth
Users that are interested in meth are comparing it to the libraries listed below
Sorting:
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Updated 2 years ago
- ☆25Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Updated last year
- Top password lists generated from leaks collected from different paste sites☆31Updated 2 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- Mobile Application Vulnerability Scanner☆25Updated 8 months ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆50Updated 9 months ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆23Updated 2 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆59Updated 5 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Master of Science in Cybersecurity, Sapienza University of Rome.☆53Updated last year
- ☆49Updated 5 years ago
- ☆27Updated 5 years ago
- Toolkit to investigate the BitTorrent network.☆10Updated last year
- ☆29Updated 2 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆22Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆37Updated 3 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆83Updated 3 years ago
- DNS hijacking via dead records automation tool☆53Updated 4 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- Burp Suite Proxy Toggler Lite Add-on for Mozilla Firefox.☆33Updated last year
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 11 months ago