Tool useful to discover services behind unknown ports
☆14May 20, 2021Updated 4 years ago
Alternatives and similar repositories for inou
Users that are interested in inou are comparing it to the libraries listed below
Sorting:
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 4 years ago
- Wifi-Confusion is a tool to create to Fake Wifi Acess-Points to Confuse the Victim☆16Dec 14, 2020Updated 5 years ago
- Modern Javascript keylogger with web panel☆23May 29, 2020Updated 5 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- Android Hacking Framework to generate apk with backdoor, Works on both WAN and LAN☆19Jun 19, 2022Updated 3 years ago
- Duitku Payment gateway for PHPNuxBill☆12Aug 23, 2025Updated 6 months ago
- This is a minified exploit for mikrotik routers. It does not require any aditional modules to run.☆28Oct 4, 2018Updated 7 years ago
- A Payload Injector for bugbounties written in go☆70Jul 18, 2020Updated 5 years ago
- You can use this CLI script to enable and disable the CloudFlare DDOS protection for your website automatically based on the CPU load of …☆26Nov 19, 2024Updated last year
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- ☆11May 6, 2019Updated 6 years ago
- ☆10Jun 16, 2018Updated 7 years ago
- Samsung Galaxy A52s 5G (a52sxq) TWRP Device Tree.☆12Jan 27, 2024Updated 2 years ago
- A few snippets to show how suricata stats can end up in Influx DB using logstash☆12Jul 11, 2016Updated 9 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- This is a bash script used for ISPConfig 3 server migrations☆15Sep 13, 2016Updated 9 years ago
- Tool to find SMTP servers vulnerable to open relay☆83Feb 13, 2020Updated 6 years ago
- volatility explorer☆92Nov 16, 2020Updated 5 years ago
- CGNAT em dispositivos baseados em RouterOS☆12May 14, 2019Updated 6 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- ☆11Nov 29, 2018Updated 7 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Aplikasi untuk menganalisis log Mikrotik dengan interface modern menggunakan EJS, Express, Element UI, dan Alpine.js.☆27Nov 8, 2025Updated 3 months ago
- ☆16Aug 17, 2025Updated 6 months ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- 👤 🗑 Deletes users that did not log in in the last days.☆10Updated this week
- Run x509lint from a PostgreSQL function☆11Apr 3, 2020Updated 5 years ago
- Fathimah bot Telegram support plugins.☆13Aug 19, 2017Updated 8 years ago
- Powershell script to download the latest 3rd party software☆14Feb 5, 2021Updated 5 years ago
- ☆15Sep 4, 2024Updated last year
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- A remover of DRC (Dynamic Range Control, i.e., compression) sticking to all audio outputs on some major devices☆10Mar 27, 2022Updated 3 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- ☆11Dec 24, 2019Updated 6 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago