☆54Apr 3, 2024Updated 2 years ago
Alternatives and similar repositories for asd
Users that are interested in asd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fully automated Data Forensics / Recovery bot to recover, undelete, index, and organize as much as possible for any hard drive, and optio…☆13Feb 5, 2024Updated 2 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆13May 20, 2021Updated 4 years ago
- ☆20Feb 19, 2025Updated last year
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Correction and installation of WIFITE's HCX dependencies/Correção e instalação das dependências HCX do WIFITE☆13Dec 21, 2023Updated 2 years ago
- ☆15Sep 30, 2021Updated 4 years ago
- hackathon, hacking-tool, termux-hacking, termux-environment, nitro-friendly☆10Sep 17, 2020Updated 5 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Feb 27, 2018Updated 8 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- This Project will let you install termux black . metasploit , various tools and Kali Nethunter Rootless without any error in your Termux.☆18Sep 14, 2020Updated 5 years ago
- Wi-Fi based covert channel that hides information in hand crafted acknowledgement frames imitating additional channel effects that can be…☆26Apr 1, 2018Updated 8 years ago
- These are favored by companies who deal with sensitive information to prevent leaks. The 5GHz WiFi jammer is effective up to 40 meters an…☆18May 1, 2021Updated 4 years ago
- Python code to to compute PMKs, PTKs, and MICs given data from a WPA2 4-way handshake☆15Oct 29, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Spy-Bot: A Cloud Penetration Testing Approach for Wireless Penetration Testing.☆18Nov 2, 2017Updated 8 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- a Netflix Checker made with Selenium☆22Nov 25, 2020Updated 5 years ago
- The tool generates a malicious HTTPS page using Ngrok Port Forwarding method, and a javascript code to perform cam requests using MediaDe…☆29May 16, 2020Updated 5 years ago
- Generate and validate United Kingdom national insurance numbers using PHP or JavaScript.☆31Mar 2, 2012Updated 14 years ago
- Use onlinehashcrack.com api with python to crack rar,zip,cap,docx etc.. 20 million+ wordlist and hybrid bruteforce.☆19Mar 17, 2021Updated 5 years ago
- ☆25Oct 2, 2021Updated 4 years ago
- Virus Repository☆29Jan 2, 2022Updated 4 years ago
- ABA/routing number validation tools☆41Mar 23, 2012Updated 14 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Facebook Hacking Menu☆39Apr 25, 2020Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Use this script to search through locally stored files for any Credit/Debit card details.☆33Nov 24, 2019Updated 6 years ago
- Facebook bot dumper&scraper☆41Oct 13, 2024Updated last year
- Refluxion -- MITM WPA attacks tool☆39Jul 18, 2020Updated 5 years ago
- Hosted Reverse Shell generator with a ton of functionality (thanks 0day!)☆42Sep 24, 2024Updated last year
- Wireless EMP (WEMP) - A simple shell script that kicks all devices off of a network for as long as desired☆35Feb 1, 2017Updated 9 years ago
- Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.☆44Feb 20, 2021Updated 5 years ago
- ☆39Mar 5, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Virus Repository☆53Oct 13, 2024Updated last year
- IP and geolocation tracking tool☆62Oct 3, 2024Updated last year
- Find exploits in local and online database☆80Oct 3, 2024Updated last year
- Meterpreter payload for all platforms☆77Jan 2, 2022Updated 4 years ago
- This Script will produce all of the WPA2 Passwords used by various Router companies aswell as Fritzbox. All of these Passwords will be 16…☆79Mar 9, 2023Updated 3 years ago
- Admin Panel Bruteforce☆82Oct 13, 2024Updated last year
- the best and small passwords lists to crack handshake wpa-wpa2☆81Apr 13, 2021Updated 5 years ago