jgamblin / imagesnapLinks
A Quick POC To Show Why You Should Disable/Cover Your Webcam
☆19Updated 8 years ago
Alternatives and similar repositories for imagesnap
Users that are interested in imagesnap are comparing it to the libraries listed below
Sorting:
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Recon tool using Yatedo and Pipl☆9Updated 10 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- SlyPI☆19Updated 11 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- ☆15Updated 8 years ago
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆21Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- A python script for obfuscating wireless networks☆78Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- ☆12Updated 8 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago