evilsocket / dotfilesLinks
My zsh, bash and vim dot files
☆68Updated 6 years ago
Alternatives and similar repositories for dotfiles
Users that are interested in dotfiles are comparing it to the libraries listed below
Sorting:
- Backup scripts I use on my drives.☆25Updated 7 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆59Updated 6 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 2 months ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 6 years ago
- Rogue AP killer☆90Updated 7 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- A Upnp exploitation tool.☆106Updated 5 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆56Updated 4 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆115Updated 9 years ago
- WPS scan and pwn tool☆70Updated 5 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Updated 7 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- Hardening Tool for *nixes☆50Updated 8 years ago
- A python script for obfuscating wireless networks☆79Updated 8 years ago
- Enterprise WPA Wireless Tool Suite☆85Updated 3 years ago
- Smoking Linux Every Day!☆55Updated 5 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago