dugsong / dscan
something i needed once
☆18Updated 13 years ago
Alternatives and similar repositories for dscan:
Users that are interested in dscan are comparing it to the libraries listed below
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Updated 12 years ago
- Public version of PDF X-RAY☆59Updated 12 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆24Updated 10 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- ☆57Updated 10 years ago
- Forensic Dropbox☆21Updated 12 years ago
- ☆14Updated 5 years ago
- eSentire additions to the nmap network scanner☆13Updated 8 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- A tool for netpens.☆31Updated 5 years ago
- Password analysis software☆37Updated 9 years ago
- ☆27Updated 7 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Next major release of sniffMyPackets - Now with added packet loving☆12Updated 9 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- SlyPI☆18Updated 11 years ago
- Phishing Toolkit☆19Updated 6 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Updated 10 years ago
- Bash-completion script for Nmap☆68Updated 7 years ago
- DNS zone transfer research☆57Updated 8 years ago
- A schema language for JSON documents that allows validation and compilation into various database engines☆41Updated last week
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Megatron - A System for Abuse- and Incident Handling☆42Updated 7 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 8 years ago
- Simple list of decrypt tools that could help recover data encrypted by ransomwares☆17Updated 8 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Updated 10 years ago