hdm / mac-agesLinks
This repository has been combined with mac-tracker project and no longer receives updates.
☆576Updated last month
Alternatives and similar repositories for mac-ages
Users that are interested in mac-ages are comparing it to the libraries listed below
Sorting:
- ☆352Updated 4 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆376Updated 3 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆539Updated 3 years ago
- Simulates enough of a Telnet connection in order to log failed login attempts.☆244Updated 8 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Updated 7 years ago
- Cleans out "open" wireless connections from OSX machine☆153Updated 5 years ago
- Implements a simple nested grammar for expanding passwords☆160Updated 2 years ago
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆174Updated 7 years ago
- ☆261Updated 7 years ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆684Updated 5 years ago
- DNS covert channel implant for Red Teams.☆732Updated 5 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆319Updated 6 years ago
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Updated 6 years ago
- Mini-Internet using LXC for practical works☆342Updated 4 months ago
- CERT Tapioca for MITM network analysis☆183Updated last year
- Read a packet capture, extract HTTP requests and turn them into cURL commands for replay.☆335Updated 2 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 7 years ago
- ☆293Updated 4 years ago
- ROCA: Infineon RSA key vulnerability☆486Updated last year
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆335Updated last year
- Seamlessly spy on SSH session like it is your tty☆349Updated 7 years ago
- Various Tools and Docker Images☆280Updated 3 months ago
- Named vulnerabilities and their practical impact☆435Updated 3 years ago
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- Interface to manage and centralize Google Alert information☆231Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆542Updated 3 months ago
- Play battleships using BGP☆435Updated 6 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago