iWar - The intelligent war dialer.
☆29Apr 1, 2020Updated 5 years ago
Alternatives and similar repositories for iwar
Users that are interested in iwar are comparing it to the libraries listed below
Sorting:
- iWar2 - The war dialer☆12Aug 29, 2017Updated 8 years ago
- A Voip Wardialer for the phreaking of 2020☆56Jun 27, 2024Updated last year
- Cyberdelia, a Collection of Command and Control frameworks☆64Oct 16, 2019Updated 6 years ago
- Docker for the latest gophish with stealth configuration from sneaky_gophish☆16Apr 5, 2024Updated last year
- Public non-official repository of the famous ToneLoc wardialer☆50May 8, 2020Updated 5 years ago
- ☆21May 13, 2019Updated 6 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Flexible Orange Box (Type II Caller ID Generator)☆26Nov 28, 2022Updated 3 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- AFF4 Standard Documents☆29Feb 4, 2022Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- This is a list of Computer and Network Security Axioms☆30May 1, 2020Updated 5 years ago
- recon-ng Maltego local transform pack☆39Dec 10, 2013Updated 12 years ago
- Creating function call graphs based on radare2 framwork, plot fancy graphs and extract behavior indicators☆33Dec 11, 2016Updated 9 years ago
- The ultimate phishing tool with 38 websites available!☆14Nov 7, 2024Updated last year
- A magnet u-joint arms and effector for the Rostock delta 3d printer.☆20May 31, 2013Updated 12 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 2 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Jun 23, 2024Updated last year
- Detect Stalkers with Wardriving, using Python☆47Aug 4, 2023Updated 2 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Export Tweets from Twitter into JSON file then publish as a Graph objects in Neo4j DB☆10Dec 7, 2018Updated 7 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆51Jun 6, 2023Updated 2 years ago
- Data notification service: subscribe to keywords and get notified whenever an open data sources mentions that keyword.☆24Aug 25, 2013Updated 12 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- Utils for Cryptography class (1047622)☆14Nov 13, 2025Updated 3 months ago
- Frequently asked questions about augmentation, biohacking, grinding, implants, and related topics.☆10Nov 26, 2024Updated last year
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- Protected LUA DPS Addon☆32Apr 3, 2015Updated 10 years ago
- Dark Blue is a set of tools designed to help teams better prepare for CyberPatriot competition rounds by trying to make it easy to create…☆16Jul 30, 2022Updated 3 years ago
- Monte Carlo password checking☆11Aug 14, 2017Updated 8 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Aug 30, 2024Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆43Jun 27, 2022Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- The commands and scripts I used in the Live Recon Village talks☆37Mar 14, 2021Updated 4 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago