evilsocket / coffeeLinks
Smarter Coffee terminal client.
☆94Updated 9 years ago
Alternatives and similar repositories for coffee
Users that are interested in coffee are comparing it to the libraries listed below
Sorting:
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- Chat with hacker assistant☆194Updated 8 years ago
- ☆25Updated 8 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 9 years ago
- Detect snooper on your system!☆85Updated 9 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆75Updated 7 years ago
- Removed according to regulations☆35Updated 8 years ago
- A Simple ARP Spoofer using Scapy☆107Updated 10 years ago
- Tools for 802.11 information gathering.☆119Updated 3 years ago
- HTTP Header Analysis Vulnerability Tool☆115Updated 5 years ago
- A powerful and extensible wireless drop box☆267Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 5 years ago
- wifitap updated for BT5r3☆153Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Detect silent (unwanted) changes to files on your system☆162Updated 5 years ago
- SockStress DoS (Denial of Service) exploit written in Python |☆38Updated 10 years ago
- The Hacker's ToolBox☆190Updated 8 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 10 years ago
- PenQ is an open source Linux based penetration testing browser bundle built over Mozilla Firefox. It comes pre-configured with security t…☆82Updated 12 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆178Updated 5 years ago
- Automated man-in-the-middle attack tool.☆52Updated 11 years ago
- Hash cracker☆57Updated 7 years ago
- Stargate☆96Updated 9 years ago
- Automated WiFi limit evasion☆119Updated 9 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆107Updated 9 years ago
- Docker container to run PoisonTap☆15Updated 9 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- A complete refactor and different take on a traditional attack script for exploiting XML-RPC pingback(s) on WordPress.☆29Updated 8 years ago
- BlackNurse attack PoC☆176Updated last month