evilsocket / pineproxy
A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.
☆17Updated 9 years ago
Alternatives and similar repositories for pineproxy:
Users that are interested in pineproxy are comparing it to the libraries listed below
- Network white noise collector☆19Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 4 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 11 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 11 years ago
- recon framework in ruby☆13Updated 13 years ago
- ☆39Updated 9 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Updated 11 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- log file scrubber☆16Updated 6 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Reverse proxy for HTTPS services, with SSL verification.☆60Updated last year
- bash script to help you , doing many penetration testing based on kali linux , help pentester and hackers to deal with kali linux in easy…☆17Updated 10 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago