chadillac / FitBlipperLinks
A simple python script used to generate bit flipped versions of domain names
☆23Updated 4 years ago
Alternatives and similar repositories for FitBlipper
Users that are interested in FitBlipper are comparing it to the libraries listed below
Sorting:
- ☆16Updated 9 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- Automated OpenSSH hardening☆42Updated 8 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 4 months ago
- Rogue AP killer☆92Updated 7 years ago
- WordPress Honeypot☆35Updated 7 years ago
- DNS zone transfer research☆59Updated 9 years ago
- File transfer via DNS☆74Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- Scrape pastes from pastebin and archive them for review☆17Updated 6 years ago
- eSentire additions to the nmap network scanner☆14Updated 9 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- ☆147Updated 9 years ago
- Enterprise WPA Wireless Tool Suite☆86Updated 3 years ago
- Wifi-Biter is a dictionary generator used to generate dictionaries/wordlist for Wireless Router Passwords.☆14Updated 7 years ago
- Honeypot (Dionaea and kippo) setup script☆84Updated 9 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 8 years ago
- Password analysis software☆37Updated 10 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 6 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- disthc☆28Updated 11 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- ☆58Updated 11 years ago
- A web spider's worst nightmare.☆54Updated 13 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- Truehunter☆31Updated 4 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago