A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.
☆17Jun 29, 2015Updated 10 years ago
Alternatives and similar repositories for pineproxy
Users that are interested in pineproxy are comparing it to the libraries listed below
Sorting:
- GSM+GPRS Radio Access Network Node☆17Apr 24, 2015Updated 10 years ago
- Grouper Python Client Library☆10Apr 18, 2023Updated 2 years ago
- Static Website Generator☆25Oct 2, 2020Updated 5 years ago
- ☆30Nov 14, 2019Updated 6 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- A solid yet simple fsm implementation in Swift☆12Feb 14, 2020Updated 6 years ago
- Python Remote Administration Tool☆15Jan 8, 2017Updated 9 years ago
- SoteriumOS is a ChromiumOS-based distribution focused on being privacy-friendly to all users by removing all unnecessary network requests…☆10Feb 27, 2021Updated 5 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- A webpage monitor bot, currently used to monitor Twitter ToS.☆19Nov 10, 2022Updated 3 years ago
- Dll Injection and Code injection sample☆13Mar 10, 2015Updated 11 years ago
- A tool (and library) for TACKs☆31Jun 15, 2017Updated 8 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Dec 23, 2020Updated 5 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- Stagefright Android exploit☆18Aug 11, 2022Updated 3 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆32Mar 21, 2015Updated 10 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Jun 10, 2025Updated 9 months ago
- Spy on your friend Android App☆12Feb 13, 2017Updated 9 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- A WiFi Pineapple infecting worm.☆16Aug 12, 2015Updated 10 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- HTB Jail Remote Exploit By Cneeliz - 2017☆15Jan 9, 2018Updated 8 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- A Powershell script that looks for specific emails in an exchange users mailbox, downloads the attachments, then marks those emails as re…☆17Apr 22, 2024Updated last year
- WPScan is a black box WordPress vulnerability scanner.☆10Oct 6, 2017Updated 8 years ago
- Tool to remove unsupported arm64e slice from a dylib based on the iOS version☆12Dec 21, 2022Updated 3 years ago
- cve-2014-4323 poc☆24Oct 15, 2015Updated 10 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Aug 23, 2017Updated 8 years ago
- Um projeto simples de um pre-compilador de portugol criado utilizando python.☆13Mar 16, 2015Updated 11 years ago
- i2p c++ implementation☆19Feb 21, 2015Updated 11 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- An implementation of the 9P protocol in Forth☆27Oct 9, 2019Updated 6 years ago
- [DEPRECATED] - Responsive, scalable, minimalist and beautiful CSS framework☆13Oct 21, 2015Updated 10 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆13Nov 1, 2023Updated 2 years ago
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- MyData -book☆26Jul 4, 2018Updated 7 years ago
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated last year