Open Methodology for Security Tool Developers
☆25Feb 23, 2016Updated 10 years ago
Alternatives and similar repositories for OMSTD
Users that are interested in OMSTD are comparing it to the libraries listed below
Sorting:
- Anti-hacking tools deploying configuration for Wordpress☆13May 27, 2020Updated 5 years ago
- SSH brute forcer tool and library, using AsyncIO of Python 3.4☆36May 27, 2020Updated 5 years ago
- Message Queue & Broker Injection tool☆149May 8, 2023Updated 2 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- ☆11Jun 28, 2022Updated 3 years ago
- CrewAI-Agentic-Jira: Enhance your Jira workflows with intelligent agent-driven automation. Powered by the CrewAI framework, this project …☆22Feb 3, 2025Updated last year
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Bxi crack version☆10Jul 7, 2022Updated 3 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Leech Tools (Free Version) provides fraud tools such us Credit Card Generator, Bank Identification Number Lookup and Credit Card Validity…☆11May 9, 2019Updated 6 years ago
- My repositories for Icestudio.☆13Jul 14, 2025Updated 7 months ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- build system to cross-compile cydia packages for cydia.radare.org☆10Aug 23, 2019Updated 6 years ago
- Running TaintDroid from the command line and analyze output☆17Mar 28, 2012Updated 13 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Discrete signal processing tool for side chanel data leakage attacks and analysis. Air-gapped keylogger PoC.☆11Oct 31, 2023Updated 2 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- rtl8821ce Offline Installer for linux.☆12Aug 12, 2019Updated 6 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Weaponize Sailfish OS with Kali linux☆12Jan 15, 2020Updated 6 years ago
- ☆13Aug 29, 2024Updated last year
- Restore iOS devices without updating via rootfilesystem DMG☆10Nov 9, 2018Updated 7 years ago
- vncsnapshot☆14Mar 23, 2012Updated 13 years ago
- Class to help with adding logging function in smali output from 3rd party Android apps.☆10May 20, 2014Updated 11 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Code repository for Practical XMPP, published by Packt☆10Jan 30, 2023Updated 3 years ago
- A CAPTCHA recognition demo in tensorflow.☆11Jun 13, 2017Updated 8 years ago
- ☆12Oct 12, 2013Updated 12 years ago