Simple network tools written with Scapy.
☆23Mar 22, 2016Updated 10 years ago
Alternatives and similar repositories for network-hacking-scripts
Users that are interested in network-hacking-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Stay up-to-date with the latest and greatest ethical hacking tools and resources.☆41Jan 21, 2022Updated 4 years ago
- Scripts to aid in the manipulation of electromagnetic radiation (for use with gnu_radio and SDR).☆79Sep 4, 2017Updated 8 years ago
- Add UART and LCD 1602 to HACKRF.☆14Sep 1, 2015Updated 10 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 5 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆35Oct 15, 2025Updated 6 months ago
- A simple keylogger made in python☆16Aug 10, 2017Updated 8 years ago
- Reverse engineering MiLight remote-controlled lightbulbs☆13May 13, 2016Updated 9 years ago
- List of OSINT Capture The Flag platforms☆55Mar 27, 2026Updated last month
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Single hashcat rule file containing all possible rules.☆10Oct 20, 2015Updated 10 years ago
- Peer DID method implementation in Python☆12Sep 27, 2023Updated 2 years ago
- ☆59Dec 10, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- mirror: https://git.kernel.org/cgit/linux/kernel/git/devicetree/devicetree-rebasing.git/☆11Jan 28, 2020Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Cross-platform user-space file systems for Python☆14Jul 3, 2021Updated 4 years ago
- Single-WebApp-Target essentials testing methodology tool starting at recon-information gathering for the juicy stuff ended up in exploita…☆23Jun 15, 2021Updated 4 years ago
- Just a dumping ground of random gnuradio stuff☆23Apr 25, 2016Updated 10 years ago
- Github Workflows üzerinde Çalışan A101 Aktüel Telegam Bot☆14Sep 29, 2023Updated 2 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Detecting SQL Injections using AST☆13Apr 29, 2019Updated 7 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python 3 script for interacting with Shodan API☆20Nov 4, 2024Updated last year
- Code and resources related to AAI in a Django context☆11Oct 30, 2022Updated 3 years ago
- Cell ID Coordinates is a Python Script to fetch Location Data(Latitude, Longitude) of Cell Towers☆14Dec 10, 2019Updated 6 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- Reconflow is all in one tool for gathering reconnaissance information about a target in a penetration test☆14Jul 18, 2021Updated 4 years ago
- BlackHat Asia 2025 code and presentations☆17Apr 13, 2025Updated last year
- moduled sniffer TCP/UDP Proxy for man-in-the-middle attack☆16Aug 8, 2018Updated 7 years ago
- WebSocket Connection Smuggler☆47Sep 30, 2022Updated 3 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Kotlin Multiplatform SD-JWT library☆12Dec 13, 2023Updated 2 years ago
- Specifications for the Swedish OpenID Connect profile☆14Mar 22, 2026Updated last month
- Threat Hunting queries of multiple platforms☆66Apr 17, 2026Updated last week
- Python Protocol Simulator☆14Oct 16, 2016Updated 9 years ago
- Spam Honeypot Tool☆27Jun 1, 2016Updated 9 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Apr 25, 2018Updated 8 years ago
- Sniff and decode NRF24L01+ and Bluetooth Low Energy using RTL-SDR☆26Feb 3, 2017Updated 9 years ago