bg-wa / QRExtractor
Extract files using QR Codes
☆10Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for QRExtractor
- Let's obscure some IPv4 addresses☆36Updated 2 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆16Updated 5 years ago
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆39Updated 4 years ago
- Handy scripts developed and discussed on http://auditcasts.com☆19Updated 5 years ago
- Audits AD hashdump and looks for instances for password reuse☆12Updated 5 years ago
- Updated version of C2K☆49Updated 6 years ago
- ☆28Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 6 years ago
- 504 VSAgent☆23Updated 6 years ago
- LFI (Local File Inclusion) Exploitation Tool☆18Updated 3 years ago
- 3 tools that work together to simplify reconaissance of Windows File Shares☆164Updated 6 years ago
- Various tools, scripts, and techniques☆19Updated 4 years ago
- Powershell - web traffic whitenoise generator☆46Updated 4 years ago
- All my slides for any talks☆23Updated last month
- Collection of rules and debug data for hashcat☆17Updated 7 years ago
- Detects Cisco DTP modes for VLAN Hopping (passive detection)☆74Updated 10 years ago
- Automatic Sender Policy Framework Reconnaissance☆18Updated 6 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 3 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- Rapid Assessment of Web Resources☆18Updated 8 years ago
- ☆73Updated 6 years ago
- A tool to abuse Exchange services☆18Updated 5 years ago
- A curated list of Awesome Threat Intelligence resources☆46Updated 6 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Updated 4 years ago
- Wireless Pentesting Device☆20Updated 4 years ago
- Passive internal reconnaissance tool☆67Updated 2 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆103Updated 7 years ago