Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
β764Jun 22, 2020Updated 5 years ago
Alternatives and similar repositories for spoilerwall
Users that are interested in spoilerwall are comparing it to the libraries listed below
Sorting:
- Count the number of people around you by monitoring wifi signalsβ7,125Aug 17, 2024Updated last year
- π¨βπSet up your Linux server with plain shell scriptsβ1,176Sep 18, 2021Updated 4 years ago
- Command line utility for searching and downloading exploitsβ1,815Sep 10, 2025Updated 5 months ago
- π‘ A python program to create a fake AP and sniff data.β1,691Nov 3, 2019Updated 6 years ago
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.β7,316Jul 27, 2021Updated 4 years ago
- get things from one computer to another, safelyβ22,381Dec 30, 2025Updated 2 months ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords arenβ¦β9,219Oct 4, 2023Updated 2 years ago
- like ~~grep~~ UBER, but for binariesβ1,766Jan 5, 2026Updated last month
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integrationβ262Oct 18, 2017Updated 8 years ago
- Seamlessly spy on SSH session like it is your ttyβ348Sep 30, 2017Updated 8 years ago
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.β1,801Feb 28, 2025Updated last year
- Generate links that users can use to submit messages encrypted with your public key.β955Dec 9, 2024Updated last year
- DEPRECATED StackImpact Python Profiler - Production-Grade Performance Profiler: CPU, memory allocations, blocking calls, exceptions, metrβ¦β654May 14, 2019Updated 6 years ago
- Secure and simple terminal sharingβ1,619Mar 6, 2018Updated 7 years ago
- Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcatβ12,222Dec 26, 2024Updated last year
- Make Hacker News your Facebook newsfeed! πΈπ°β316Jul 30, 2017Updated 8 years ago
- OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.β12,917Updated this week
- online port scan scraperβ1,120Aug 7, 2023Updated 2 years ago
- honeyΞ» - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on topβ¦β522Oct 20, 2018Updated 7 years ago
- ππ₯π Next Level PGPβ3,468Mar 27, 2019Updated 6 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.β1,092Feb 19, 2019Updated 7 years ago
- A demo of overriding what's in a person's clipboardβ1,433Jan 2, 2024Updated 2 years ago
- Wardriving ekopartyβ15Oct 9, 2017Updated 8 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare networkβ2,514Mar 26, 2024Updated last year
- Nginx configuration static analyzerβ8,550Jul 28, 2024Updated last year
- How to rickroll Spotify for Androidβ529Apr 6, 2017Updated 8 years ago
- SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)β2,990Jun 28, 2024Updated last year
- Uses WiFi signals and machine learning to predict where you areβ5,146Nov 30, 2023Updated 2 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons coβ¦β6,445Nov 26, 2018Updated 7 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.β2,291Jul 10, 2024Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.β1,322Sep 1, 2021Updated 4 years ago
- WarBerryPi - Tactical Exploitationβ2,225Nov 9, 2019Updated 6 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when yourβ¦β67Jun 30, 2017Updated 8 years ago
- Tweets metadata scraper & activity analyzerβ2,977Nov 14, 2023Updated 2 years ago
- π₯ A powerful MongoDB auditing and pentesting tool π₯β1,331Apr 17, 2023Updated 2 years ago
- Distributed private networkingβ3,525Feb 1, 2023Updated 3 years ago
- The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.β47,608Apr 18, 2024Updated last year
- A subdomain enumeration tool.β895Aug 10, 2021Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)β827Nov 3, 2017Updated 8 years ago