☆54Apr 3, 2024Updated last year
Alternatives and similar repositories for asd
Users that are interested in asd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fully automated Data Forensics / Recovery bot to recover, undelete, index, and organize as much as possible for any hard drive, and optio…☆13Feb 5, 2024Updated 2 years ago
- ☆19Feb 19, 2025Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆10Jun 18, 2020Updated 5 years ago
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Correction and installation of WIFITE's HCX dependencies/Correção e instalação das dependências HCX do WIFITE☆13Dec 21, 2023Updated 2 years ago
- hackathon, hacking-tool, termux-hacking, termux-environment, nitro-friendly☆10Sep 17, 2020Updated 5 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- This Project will let you install termux black . metasploit , various tools and Kali Nethunter Rootless without any error in your Termux.☆17Sep 14, 2020Updated 5 years ago
- Wi-Fi based covert channel that hides information in hand crafted acknowledgement frames imitating additional channel effects that can be…☆26Apr 1, 2018Updated 7 years ago
- These are favored by companies who deal with sensitive information to prevent leaks. The 5GHz WiFi jammer is effective up to 40 meters an…☆18May 1, 2021Updated 4 years ago
- Accurately Locate Smartphones using Social Engineering☆13Jun 3, 2020Updated 5 years ago
- Spy-Bot: A Cloud Penetration Testing Approach for Wireless Penetration Testing.☆18Nov 2, 2017Updated 8 years ago
- Evil Twin Attack Bash script☆12Feb 21, 2016Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- The tool generates a malicious HTTPS page using Ngrok Port Forwarding method, and a javascript code to perform cam requests using MediaDe…☆29May 16, 2020Updated 5 years ago
- Generate and validate United Kingdom national insurance numbers using PHP or JavaScript.☆31Mar 2, 2012Updated 14 years ago
- Use onlinehashcrack.com api with python to crack rar,zip,cap,docx etc.. 20 million+ wordlist and hybrid bruteforce.☆20Mar 17, 2021Updated 5 years ago
- Virus Repository☆28Jan 2, 2022Updated 4 years ago
- ABA/routing number validation tools☆40Mar 23, 2012Updated 14 years ago
- Moonbounce is graphical user interface for using an OpenVPN client and server with Pluggable Transport support. The goal of Moonbounce is…☆37Apr 25, 2024Updated last year
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆12Oct 26, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Facebook bot dumper&scraper☆39Oct 13, 2024Updated last year
- Refluxion -- MITM WPA attacks tool☆39Jul 18, 2020Updated 5 years ago
- This project contains the nexmon-based source code required to repeat the experiments of our WiSec 2017 paper.☆65Sep 6, 2017Updated 8 years ago
- Wireless EMP (WEMP) - A simple shell script that kicks all devices off of a network for as long as desired☆35Feb 1, 2017Updated 9 years ago
- Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.☆44Feb 20, 2021Updated 5 years ago
- ☆39Mar 5, 2024Updated 2 years ago
- Virus Repository☆51Oct 13, 2024Updated last year
- ☆42Jul 3, 2016Updated 9 years ago
- RDPTown: Get your own free Linux RDP or virtual computer on Google Cloud, with just a Google account!☆59May 14, 2025Updated 10 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Herramienta ideal para automatizar ataques WiFi (WEP & WPA/WPA2 - PSK) destinados a la obtención de la contraseña.☆60Sep 14, 2021Updated 4 years ago
- IP and geolocation tracking tool☆60Oct 3, 2024Updated last year
- Its like airgeddon but better!☆60Jul 27, 2024Updated last year
- Wordlist générator, router flood and Wifi Cracker☆54Apr 5, 2020Updated 5 years ago
- ☆58Mar 11, 2020Updated 6 years ago
- Find exploits in local and online database☆79Oct 3, 2024Updated last year
- Meterpreter payload for all platforms☆74Jan 2, 2022Updated 4 years ago