hackvertor / HTTPLeaks
HTTPLeaks - All possible ways, a website can leak HTTP requests
☆15Updated 9 years ago
Alternatives and similar repositories for HTTPLeaks:
Users that are interested in HTTPLeaks are comparing it to the libraries listed below
- Docker container to run PoisonTap☆15Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 7 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- A website outlining my bounty hunt game.☆11Updated 5 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- ☆13Updated 7 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Updated 7 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- Download files out of open AWS buckets☆38Updated 6 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Updated 6 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆27Updated 7 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Tor relay certificate downloader☆11Updated 8 years ago
- ☆27Updated 7 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Red Team Resources☆59Updated 6 years ago