education-script-projects / PyCPULinks
Central Processing Unit Information Gathering Tool
☆22Updated 5 years ago
Alternatives and similar repositories for PyCPU
Users that are interested in PyCPU are comparing it to the libraries listed below
Sorting:
- GUI Tool to generate threat intelligence information in various formats☆44Updated 7 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆40Updated 8 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Updated 7 years ago
- Dependencies for Veil 3☆17Updated 8 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- phishing reporting tool☆14Updated 7 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆20Updated 8 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- Express security essentials deployment for Linux Servers☆60Updated 5 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆15Updated 6 years ago
- w3af packaging for Kali distribution☆26Updated 10 years ago
- Framework for Rogue Wi-Fi Access Point Attack☆12Updated 10 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- Detecting malicious WiFi with mining cryptocurrency.☆51Updated 7 years ago
- Automated Cyber Offense☆88Updated 6 years ago
- Rootkit Detector for UNIX☆61Updated 2 years ago
- A modular pentesting framework implemented in C☆13Updated 7 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- Dragon Sandbox☆79Updated 12 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- An tool for search IOT MQTT vulnerable with shodan☆20Updated 8 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Updated 8 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago