dugsong / dscan
something i needed once
☆19Updated 14 years ago
Alternatives and similar repositories for dscan:
Users that are interested in dscan are comparing it to the libraries listed below
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Updated 12 years ago
- Phishing Toolkit☆20Updated 7 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆30Updated 11 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- lulz: automated webstalking tool☆52Updated 8 years ago
- ☆14Updated 5 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- ☆57Updated 10 years ago
- Maltego Transforms to Query Traffic Records☆34Updated 9 years ago
- Maltego with a twist of wireless☆25Updated 10 years ago
- SlyPI☆18Updated 11 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Updated 10 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆38Updated 4 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 11 years ago
- Checks to see when the cert for a given domain expires.☆18Updated 2 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 10 years ago
- Arduino-based network monitor☆24Updated 13 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆22Updated 7 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago