evilsocket / Kerby_Surveillance
Kerby - Light weight video surveillance system.
☆9Updated 15 years ago
Related projects: ⓘ
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆13Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆28Updated 10 years ago
- darm - intelligent network sniffer for the masses darm is an attempt to create a very easy to use app that will sniff and report informa…☆27Updated 11 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆34Updated 10 years ago
- Recon tool using Yatedo and Pipl☆9Updated 9 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- autoscan - automatic fingerprint of visited networks☆10Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆45Updated 8 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- ☆17Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- Download all malicious files from a Kippo SSH honeypot database☆22Updated 10 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆12Updated 8 years ago
- ☆15Updated 7 years ago
- Security Advisories and Researches☆14Updated 10 years ago
- SQL Injection without the pain of syringes.☆24Updated 7 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- ☆23Updated this week
- BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .☆24Updated 15 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆79Updated 11 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆17Updated 9 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆21Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago