dom96 / deautherLinks
An interactive command-line deauther for macOS.
☆73Updated 6 years ago
Alternatives and similar repositories for deauther
Users that are interested in deauther are comparing it to the libraries listed below
Sorting:
- Probably the first ELF binary infector ever created in Nim.☆28Updated 5 years ago
- Nim Socks5 library☆30Updated 3 years ago
- ☆21Updated 4 years ago
- Library for reading KeePass files and decrypt the passwords within it☆14Updated last year
- DrMITM is a program designed to globally log all traffic of a website.☆29Updated 6 years ago
- Icon file generator for Windows, macOS, Web☆16Updated 8 months ago
- •.NET Clipboard for Nim•☆15Updated 6 years ago
- Raw system calls for Nim☆42Updated 11 months ago
- Interactive Windows Reverse Shell Server/Client☆42Updated 4 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- A filtering SOCKS proxy server and client library written in nim.☆64Updated 2 years ago
- subhook wrapper for Nim https://github.com/Zeex/subhook☆17Updated 6 months ago
- Rex library for various exploitation helpers☆22Updated last month
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- A virus checker for nim binaries☆22Updated 6 months ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆52Updated 4 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆70Updated 5 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆13Updated last year
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Archive of Metasploit Framework v2 (Perl)☆16Updated 10 years ago
- ☆16Updated 5 years ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆12Updated 8 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Deal with Windows Registry from Nim☆30Updated last year
- ld_preload userland rootkit☆34Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- Advanced Encryption Standard, Rinjdael Algorithm written in Nim☆54Updated 2 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Updated 6 years ago
- the puppy proxy☆22Updated 5 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago