dom96 / deauther
An interactive command-line deauther for macOS.
☆72Updated 6 years ago
Alternatives and similar repositories for deauther:
Users that are interested in deauther are comparing it to the libraries listed below
- Probably the first ELF binary infector ever created in Nim.☆28Updated 4 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆29Updated 5 years ago
- ☆20Updated 3 years ago
- Library for reading KeePass files and decrypt the passwords within it☆14Updated 7 months ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆52Updated 4 years ago
- •.NET Clipboard for Nim•☆14Updated 5 years ago
- Nim Socks5 library☆30Updated 3 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- the puppy proxy☆22Updated 4 years ago
- Icon file generator for Windows, macOS, Web☆16Updated 3 months ago
- subhook wrapper for Nim https://github.com/Zeex/subhook☆17Updated last month
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆53Updated 3 years ago
- Advanced Encryption Standard, Rinjdael Algorithm written in Nim☆54Updated 2 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆67Updated 5 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- Raw system calls for Nim☆41Updated 6 months ago
- A filtering SOCKS proxy server and client library written in nim.☆61Updated last year
- ☆35Updated 12 years ago
- A virus checker for nim binaries☆22Updated 2 months ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Linux Runtime Process Injection Tool☆58Updated 11 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆62Updated 3 years ago
- This module implements a Docker Engine client via Remotet API. This client is asynchronous, so it can be used to provide web service.☆35Updated 8 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Deal with Windows Registry from Nim☆29Updated 9 months ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago