evilsocket / pineproxy
A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.
☆17Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for pineproxy
- Network white noise collector☆18Updated 8 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- recon framework in ruby☆13Updated 12 years ago
- Fingerprint server side technology☆28Updated 11 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 8 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- Scripts for Kali on Android.☆8Updated 10 years ago
- ☆12Updated 7 years ago
- Phishing Toolkit☆19Updated 6 years ago
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆20Updated 10 years ago
- Docker container to run PoisonTap☆15Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆38Updated 4 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 9 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆11Updated 11 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆19Updated 8 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Service desk password tools.☆15Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago