A client/server style agent meant for testing connectivity to and from a machine on a network.
☆20Aug 17, 2017Updated 8 years ago
Alternatives and similar repositories for smith
Users that are interested in smith are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- A website outlining my bounty hunt game.☆11Oct 13, 2019Updated 6 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 11 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆55Dec 4, 2022Updated 3 years ago
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆128Apr 28, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 3 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆81Jun 30, 2018Updated 7 years ago
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 5 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆245Nov 23, 2020Updated 5 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Photo forensics tool that detects alteration of JPEG images☆10May 13, 2021Updated 4 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Sep 18, 2024Updated last year
- ☆16Mar 31, 2017Updated 9 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- Python framework for IT security tools☆269Jan 28, 2017Updated 9 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆12Apr 19, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 7 years ago
- Truehunter☆30May 15, 2021Updated 4 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- Script to generate malicious debian packages (debain trojans).☆120Apr 24, 2019Updated 7 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆50Jul 16, 2017Updated 8 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Pcap (capture file) Analysis Toolkit(v.1)☆110Feb 8, 2017Updated 9 years ago
- Search for information related to domain: Emails - IP addresses - Sub-Domains - Information on WEB technology - Type of Firewall - NS and…☆116May 19, 2020Updated 5 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool to help you manage your leaks☆35Nov 22, 2017Updated 8 years ago
- Morse code daemon for unix systems☆18Nov 10, 2024Updated last year
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Metasploit Framework☆20Mar 24, 2026Updated last month
- An SDN penetration testing toolkit☆115Oct 4, 2024Updated last year
- Protect your parents from phishing☆41Dec 4, 2017Updated 8 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 9 years ago