evilsocket / backup
Backup scripts I use on my drives.
☆25Updated 7 years ago
Alternatives and similar repositories for backup:
Users that are interested in backup are comparing it to the libraries listed below
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- ☆13Updated 7 years ago
- An Android wrapper for Arc☆11Updated 6 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- ☆15Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Phishing Toolkit☆20Updated 7 years ago
- ☆20Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Puny Domain Name Check☆36Updated 5 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago