andrew-morris / PUGLinks
Generate users with "random-ish" realistic passwords or password hashes
☆18Updated 9 years ago
Alternatives and similar repositories for PUG
Users that are interested in PUG are comparing it to the libraries listed below
Sorting:
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Automatically scans for malicious proxies.☆32Updated 10 years ago
- Simple web app for displaying cowrie data in your browser☆12Updated 9 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Updated 10 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- YAPDNS☆39Updated 10 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆37Updated 3 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Puny Domain Name Check☆37Updated 6 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- ☆17Updated 11 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- ☆12Updated 8 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- SSH Multipot☆24Updated 7 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Updated 8 years ago
- DNS Botnet Server and Client☆34Updated 3 months ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Masscan integrated with Shodan API☆43Updated 8 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 16 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 7 years ago
- AYY LMAO☆22Updated 9 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Updated 8 years ago