angusshire / mac-spooferLinks
Script for spoofing network adapter's MAC address on Windows.
☆184Updated 9 years ago
Alternatives and similar repositories for mac-spoofer
Users that are interested in mac-spoofer are comparing it to the libraries listed below
Sorting:
- CLI utility for scanning user-mode process memory.☆130Updated 7 years ago
- Solutions to bioinformatics problems.☆27Updated 9 years ago
- Pure Python database management system☆97Updated 8 years ago
- git cheat sheets in your command line☆217Updated 7 years ago
- Crack MD5 passwords with JavaScript Web Workers☆386Updated 8 years ago
- Fake SSH server for confusing spammers, because we all know security through obscurity rocks.☆45Updated 9 years ago
- Write your name using the github commits and make your profile awesome☆140Updated 8 years ago
- Pixel-perfect LastPass phishing☆337Updated 9 years ago
- Make pseudonymous Git commits over Tor☆185Updated 6 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆309Updated 3 years ago
- ⌘ Speed hacks to increase productivity☆170Updated 6 years ago
- WireSheep shows you each user on the network and all the HTTP requests they're making in a pretty News Feed, a la Facebook.☆86Updated 9 years ago
- This is an Agar bot designed to blatantly cheat with an army of feeding bots.☆22Updated 10 years ago
- Imitating all commands in the Mr. Robot TV Series☆79Updated 10 years ago
- Chrome crashes on long/malformed URLs☆51Updated 10 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- Give the NSA free backdoor access to your Flask app.☆186Updated 12 years ago
- A Simple ARP Spoofer using Scapy☆106Updated 10 years ago
- PHP web-based script to connect to ALPR Image recognition software.☆55Updated 9 years ago
- Make PGP messages and signatures more interesting☆495Updated 2 years ago
- Find projects to contribute to or publish your project so others can find it.☆63Updated 8 years ago
- Past Exams for Past Berkeley EECS Courses. Please add more if you have any!☆56Updated 9 years ago
- C/C++ to assembly visualizer☆385Updated 5 years ago
- Demo of phishing attack on the native HTML5 full screen API.☆117Updated 12 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,254Updated 8 years ago
- Common components for RCS backend☆135Updated 10 years ago
- A series of exploits used to jump the OnePlus reservation queue.☆124Updated 8 years ago
- Deprecated - OLD - See Below☆45Updated 6 years ago
- HTTPS Everywhere rulesets for hidden services and eepsites.☆171Updated 8 years ago
- DuckDuckHack Instant Answer documentation for developers☆81Updated 3 years ago