curiozity / patitohunterLinks
☆12Updated 9 years ago
Alternatives and similar repositories for patitohunter
Users that are interested in patitohunter are comparing it to the libraries listed below
Sorting:
- Snort_rules detection bad actors.☆28Updated 10 months ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- Security Tool Builder: project to automate the building of hacking tools☆21Updated 3 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- Rogue Access Point Detector☆36Updated 9 months ago
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Tool to automate the whole process of environment in android audits☆14Updated 6 years ago
- Repository for the KEYVILBOARD modules☆39Updated 2 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Simple Wi-Fi Keylogger with multiple layout support.☆27Updated 5 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Software exploitation training material☆15Updated 8 years ago
- Program to perform vulnerability analysis and automatically generate a report☆56Updated 2 years ago
- MS17-010☆12Updated 7 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆21Updated 7 years ago
- ☆18Updated last year
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- ☆25Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- My collection of dockerfiles☆24Updated 9 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Nmap Web Dashboard and Reporting☆34Updated 3 years ago
- Bluetooth Recon Script☆25Updated 9 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 8 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago