TuxCoding / Default-Router-Passwords
Default passwords, webinterface ip-addresses and SSID of routers or wireless routers
☆14Updated 4 years ago
Alternatives and similar repositories for Default-Router-Passwords:
Users that are interested in Default-Router-Passwords are comparing it to the libraries listed below
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- A tool for recover router password☆29Updated 6 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- World's first Bitcoin client ddos software // Experimental program to exhaust inbound TCP connections of a Bitcoin node☆24Updated 5 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- simple script to pwn android phone with physical access☆24Updated 6 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆24Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A standalone addon for GnuPG☆18Updated 6 years ago
- Get clients and access points.☆49Updated 5 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 6 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆25Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 7 years ago
- Search .git folders for emails and URL's that should otherwise be hidden☆33Updated 4 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- A Simple C&C Server Written In Python☆34Updated 6 years ago
- Instantly search the web for hacked data. Check if you appear in any database leaks.☆14Updated 6 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆34Updated 7 years ago
- ☆29Updated 4 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 9 months ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- A fully featured backdoor that uses Telegram as a C&C server☆6Updated 8 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago