hackerschoice / thc-rutLinks
THC "R U There" network discovery tool
☆28Updated 5 years ago
Alternatives and similar repositories for thc-rut
Users that are interested in thc-rut are comparing it to the libraries listed below
Sorting:
- The Multiplatform Linux Sandbox☆15Updated last year
- A USB armory based USB sandbox☆20Updated 7 years ago
- ARP Man-in-the-Middle tool☆29Updated 5 months ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆41Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆11Updated 3 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Updated 6 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 4 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- A script to automate Jenkins credential store decryption☆17Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- ☆22Updated 4 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- wordlists for password cracking☆28Updated 2 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 4 years ago