Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.
☆54Mar 19, 2024Updated 2 years ago
Alternatives and similar repositories for uberscan
Users that are interested in uberscan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CameraDar hacks its way into RTSP CCTV cameras.☆11Oct 27, 2017Updated 8 years ago
- Anyform is a lightweight form brute-forcing tool.☆24Nov 17, 2018Updated 7 years ago
- A Python tool to for league commissioners to pull data from DraftKings.com☆11Jan 8, 2026Updated 2 months ago
- z/OS Mainframe TPX panel account enumerator and brute forcer☆20Jan 10, 2018Updated 8 years ago
- Scripts for pentesting/hacking☆18Jan 22, 2022Updated 4 years ago
- Guide to launching Termux-X11 and PulseAudio for Kali Nethunter.☆12Oct 6, 2025Updated 5 months ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- Black Hat Ethical Hacking | PHP Backdoor Shell v1.0☆19May 22, 2018Updated 7 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- A python package that helps you to create payload for facebook messenger bot.☆16Dec 8, 2022Updated 3 years ago
- Crack any ftp server by using FTP Crack Elite tool kit, ftp bruteforce☆12Nov 7, 2017Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- Scripts and code example about penetration testing, web, network and exploiting wireless devices.☆11Jun 24, 2018Updated 7 years ago
- Python Module for NFL draftkings☆13Nov 6, 2018Updated 7 years ago
- SECD machine and Lispkit Lisp compiler, in Python☆10Oct 25, 2017Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- A more complete PPS GPIO Device Tree Overlay for the RPi 5.☆15Jan 25, 2026Updated last month
- USB bootloader for the CC1111 RF SoC☆27Jun 22, 2011Updated 14 years ago
- By Using This You Can Get Someone's Location Just Using Target's Mobile Number☆12Feb 20, 2023Updated 3 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆21Jan 16, 2019Updated 7 years ago
- ☆14May 2, 2017Updated 8 years ago
- Simple Mega.co.nz Account Bruteforce Tool☆13Apr 15, 2017Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Tor relay nearest neighbour ranking☆10Oct 18, 2021Updated 4 years ago
- 💌 Gmail & Facebook Messenger-like notifications☆11Feb 18, 2020Updated 6 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- Gobarber with Design Patters and Nodejs Security☆10Dec 15, 2023Updated 2 years ago
- Public resources NB shares☆18Mar 7, 2016Updated 10 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- This is a tool written in PHP to test the security of Instagram accounts through BruteForce.☆21Jun 23, 2018Updated 7 years ago
- BruteForceBlocker is a perl script, that works along with pf firewall. Its main purpose is to block SSH bruteforce attacks via firewall.☆21Feb 17, 2021Updated 5 years ago
- Find IP address and Geolocation of target whatsapp user☆11Nov 23, 2023Updated 2 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- hacking tool☆32Jan 14, 2026Updated 2 months ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- This is a wallet analysis tool designed for building and testing strategies. It comes with powerful features, including: 🧨Exporting PnL …☆14Oct 13, 2025Updated 5 months ago
- Bash script to bruteforce snmpv3 authentication passwords using MD5 (usmHMACMD5AuthProtocol)☆32Nov 23, 2018Updated 7 years ago
- Cables Communication, secure and anonymous communication using email-like addresses.☆58Jul 29, 2014Updated 11 years ago
- lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).☆14Dec 7, 2022Updated 3 years ago