brannondorsey / letterpressLinks
A nefarious keylogger for Ubuntu. Encrypts keylogs and uploads to pastebin.
☆27Updated 8 years ago
Alternatives and similar repositories for letterpress
Users that are interested in letterpress are comparing it to the libraries listed below
Sorting:
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- A script to generate wordlists out of wikipedia pages. Should support most of the subdomains. Some ugly code may occur☆31Updated 11 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate rel…☆34Updated 6 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 15 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- Passive recon / OSINT automation script☆39Updated 7 years ago
- Arp spoof detection tool☆26Updated 8 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 4 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Docker container to run PoisonTap☆15Updated 9 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 12 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Updated 10 years ago
- log file scrubber☆15Updated 7 years ago
- ☆19Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Simple, hand-picked list of fuzz strings☆34Updated 9 years ago
- Suite for Information gathering☆12Updated 7 years ago
- Metasploit things, modules, plugins, exploits☆26Updated 11 years ago
- 📡 A security research tool with shodan integration☆25Updated 7 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 4 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago