A client/server style agent meant for testing connectivity to and from a machine on a network.
☆20Aug 17, 2017Updated 8 years ago
Alternatives and similar repositories for smith
Users that are interested in smith are comparing it to the libraries listed below
Sorting:
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- A website outlining my bounty hunt game.☆11Oct 13, 2019Updated 6 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆55Dec 4, 2022Updated 3 years ago
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆127Apr 28, 2024Updated last year
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Jun 30, 2018Updated 7 years ago
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 4 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆245Nov 23, 2020Updated 5 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Sep 18, 2024Updated last year
- ☆16Mar 31, 2017Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- Python framework for IT security tools☆268Jan 28, 2017Updated 9 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Truehunter☆30May 15, 2021Updated 4 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- Script to generate malicious debian packages (debain trojans).☆121Apr 24, 2019Updated 6 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Jul 16, 2017Updated 8 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Pcap (capture file) Analysis Toolkit(v.1)☆109Feb 8, 2017Updated 9 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116May 19, 2020Updated 5 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Morse code daemon for unix systems☆18Nov 10, 2024Updated last year
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Metasploit Framework☆20May 8, 2017Updated 8 years ago
- An SDN penetration testing toolkit☆117Oct 4, 2024Updated last year
- Protect your parents from phishing☆40Dec 4, 2017Updated 8 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago