derv82 / capjs
Pcap javascript parser
☆13Updated 6 years ago
Alternatives and similar repositories for capjs:
Users that are interested in capjs are comparing it to the libraries listed below
- 802.11 radiotap and MPDU parser☆14Updated 7 years ago
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- Google dorks generator to find open shells (on government sites)☆29Updated 10 years ago
- Distributed WPA/WPA2 cracker☆15Updated 9 years ago
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆20Updated 10 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆21Updated 7 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- Wifi Pineapple - Repository, Issue tracker, Wiki☆40Updated 12 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- Session hijacking GUI tool☆15Updated 11 years ago
- Password cracking utility☆53Updated 3 years ago
- Hacking environment installation scripts for OS X☆26Updated 3 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 9 years ago
- A web app scanner☆26Updated 11 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- #PINNING is a browser extension (currently TamperMonkey script) to improve Pinterest's desktop browsing UX☆15Updated 8 years ago
- Generate random wordlist to test your passwords' security☆13Updated 2 years ago
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆17Updated 9 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- Network white noise collector☆18Updated 8 years ago
- All xxx-arsenal repos in one☆15Updated 6 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆12Updated 2 years ago
- ☆15Updated 7 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 10 years ago
- Dump WiFi passwords on Windows 10☆20Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆10Updated 5 years ago
- This version touches disk for registry persistence.☆24Updated 9 years ago
- (◍•﹏•) - Hi, I'm Eve☆21Updated 6 years ago