☆18Jun 30, 2017Updated 8 years ago
Alternatives and similar repositories for Router-Sploit
Users that are interested in Router-Sploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆37Mar 16, 2026Updated last week
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆21Sep 10, 2025Updated 6 months ago
- 3wifi fork☆11Aug 22, 2023Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago
- SANS Holiday Hack Challenge write-up template☆28Nov 20, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Auxiliator is telegram bot for basic web-application analysis☆12Apr 24, 2024Updated last year
- ☆17Jan 9, 2025Updated last year
- Baidu 100G Chasiss Switch hardware spec☆12Sep 20, 2017Updated 8 years ago
- An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain join…☆18Mar 15, 2023Updated 3 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- ☆15Nov 29, 2017Updated 8 years ago
- Cython bindings for libpcap and libtins☆10Dec 19, 2016Updated 9 years ago
- recon-ng modules for Censys☆37Oct 23, 2023Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆20Sep 24, 2025Updated 6 months ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- Android Phone FireWall , it could help you to filter the boring Message and unknow Call.☆13May 22, 2013Updated 12 years ago
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- Ghidra script which fully parses COFF files☆12Oct 18, 2024Updated last year
- Snort/Suricata DAQ module with DPDK patch☆11Apr 10, 2024Updated last year
- An extension to the standard python 2.x smtpd library implementing implicit/explicit SSL/TLS/STARTTLS☆11Nov 29, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- Meer is a "spooler" for Suricata / Sagan.☆30Jun 21, 2023Updated 2 years ago
- ☆18Feb 4, 2016Updated 10 years ago
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Create a netfilter queue and display packets passing through. Can also save those packets to a pcap file.☆13Dec 3, 2011Updated 14 years ago
- Rotate Your Screen☆10Apr 27, 2019Updated 6 years ago
- ☆10Jun 29, 2022Updated 3 years ago
- Enables an LLM to remotely & securely control a jumphost using synchronous or asynchronous GET requests.☆13Mar 14, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆11Oct 21, 2020Updated 5 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- Automatically annotates YOLO dataset using Moondream visual model☆20Aug 24, 2025Updated 7 months ago
- A tool for managing software RAID under Linux☆16Apr 23, 2014Updated 11 years ago
- ☆10Oct 22, 2015Updated 10 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆11Mar 19, 2017Updated 9 years ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year