binkybear / user-agent_strings_dbLinks
Python scraper that grabs user agent strings and populates them into sqlite/JSON files
☆29Updated 8 years ago
Alternatives and similar repositories for user-agent_strings_db
Users that are interested in user-agent_strings_db are comparing it to the libraries listed below
Sorting:
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- A web spider's worst nightmare.☆53Updated 13 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- YAPDNS☆39Updated 10 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- post-exploitation tools☆15Updated 7 years ago
- uses keywords from alert logs to send SMS☆24Updated 9 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- ☆27Updated 8 years ago
- Small scripts for doing repeatable tasks☆25Updated 3 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Automatically scans for malicious proxies.☆32Updated 10 years ago
- ☆25Updated 10 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Leak File Analyzer☆62Updated 7 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago