cryptolok / DMC
A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device
☆40Updated 4 years ago
Alternatives and similar repositories for DMC:
Users that are interested in DMC are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Simple Karma Attack☆67Updated 4 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Updated 5 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- ☆17Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Gets in the way of your victim's traffic and out of yours☆27Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- Docker images for learning wifi hacking☆65Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- ☆46Updated 5 years ago
- Automatically spin up infra for phishing☆63Updated 5 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated last year
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 5 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆14Updated 5 years ago
- ☆17Updated last year
- THC "R U There" network discovery tool☆26Updated 4 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 2 months ago
- A script that uses nmap to expand IP ranges into a list of IPs☆9Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 2 months ago