Default Password Generator for Time Warner / Spectrum Routers
☆19Jul 27, 2017Updated 8 years ago
Alternatives and similar repositories for twcracker
Users that are interested in twcracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- ☆18Jun 25, 2024Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- A small GUI tool for converting between cap and hccap files.☆42Dec 30, 2015Updated 10 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Automatic Multi-target WPS Pin Harvester☆30May 5, 2018Updated 7 years ago
- This library enables you to use Hardware-based PWM channels on Arduino AVR ATtiny-based boards (ATtiny3217, etc.), using megaTinyCore, to…☆11Jan 28, 2023Updated 3 years ago
- polymorphic webshells☆30Oct 20, 2017Updated 8 years ago
- Simple Python script to interact with the Hacker Target API for IP Tools.☆25Jun 15, 2023Updated 2 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Aug 25, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- Creates a IMEI file suitable for use on Android MediaTek / MTK phones☆43May 16, 2022Updated 3 years ago
- ESP-IDF and PlatformIO compatible library for a circular queue or circular FIFO buffer over SPIFFS.☆14Mar 28, 2023Updated 3 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆22Sep 30, 2025Updated 6 months ago
- Command line interface to interact with hashes.com escrow service.☆44Mar 12, 2026Updated last month
- Event Data Collector☆39Mar 23, 2026Updated 2 weeks ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Persian-CreditCardForm is a forked iOS framework that allows developers to create the UI which replicates an actual Credit Card.☆10Dec 5, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- FATFS image creation for the ESP32☆19Nov 28, 2020Updated 5 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆11Oct 29, 2018Updated 7 years ago
- Transfer.sh command line program, Now file sharing from the command line is easy.☆13Feb 28, 2023Updated 3 years ago
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆41Jul 1, 2019Updated 6 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- ☄️ go-out - A Golang egress buster.☆127Feb 6, 2026Updated 2 months ago