evilsocket / pycryptocatLinks
pyCryptoCat - A CryptoCat standalone python client.
☆35Updated 11 years ago
Alternatives and similar repositories for pycryptocat
Users that are interested in pycryptocat are comparing it to the libraries listed below
Sorting:
- Backup scripts I use on my drives.☆25Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- A python script for obfuscating wireless networks☆78Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- XMLRPC server for password cracking☆33Updated 10 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Updated 9 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- uses keywords from alert logs to send SMS☆24Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago