A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device
☆40Apr 13, 2020Updated 5 years ago
Alternatives and similar repositories for DMC
Users that are interested in DMC are comparing it to the libraries listed below
Sorting:
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- Mimipenguin密码抓取神器☆26Sep 9, 2017Updated 8 years ago
- ☆11Mar 19, 2019Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Setup Kali XFCE version with some hi-dpi friendly style☆32Jul 13, 2019Updated 6 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- A Little program in Ruby that adds a progress bar to Nmap☆16Dec 13, 2020Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- CDDC Exploitation Framework☆13Jul 3, 2023Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- A hug extension providing ldap based authentication support☆13Dec 26, 2022Updated 3 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- Python module to get and analyze data from Binance very easily.☆25Mar 14, 2026Updated last week
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Encode and decode smart contract invocations☆11Mar 17, 2021Updated 5 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Tool to list, view and extract files from ggpack data files used by the Thimbleweed Park game☆11Oct 27, 2018Updated 7 years ago
- badUSB & RubberDucky & PoisonTap ultimate mitigation for Linux☆68Oct 1, 2017Updated 8 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- Check if IP address is part of AWS infrastructure☆18Dec 2, 2020Updated 5 years ago
- Phone bluetooth suite that can track and prompt user notification☆17May 30, 2024Updated last year
- A collection of hashcat-hcstat files☆33Feb 13, 2018Updated 8 years ago
- A collection of Python code, useful for RF work☆13Sep 2, 2022Updated 3 years ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago
- Verilog Language Extension for Visual Studio☆20Jan 14, 2026Updated 2 months ago
- Hamburglar -- collect useful information from urls, directories, and files☆320Jan 3, 2026Updated 2 months ago
- Cheat sheet☆37Dec 16, 2019Updated 6 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- ☆36Jul 11, 2018Updated 7 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 3 months ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Mar 26, 2020Updated 5 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Certificate Export Utility☆26May 1, 2020Updated 5 years ago