Identify connection of sessions for social engineering attacks.
☆58Nov 15, 2016Updated 9 years ago
Alternatives and similar repositories for sack
Users that are interested in sack are comparing it to the libraries listed below
Sorting:
- Small backdoor using cookie.☆63Oct 18, 2016Updated 9 years ago
- Simple Webshell Scanner☆55Jan 11, 2015Updated 11 years ago
- Easy brute forcing to whatever you want - Jose Pino☆65Mar 23, 2015Updated 10 years ago
- Lightweight static site generator in PHP without a database.☆17Sep 15, 2015Updated 10 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆33Oct 15, 2015Updated 10 years ago
- A text generator based on companies logos☆18Jan 8, 2019Updated 7 years ago
- always amend and --force push☆12Nov 28, 2017Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- get the perfect gif in your gitter activity feed☆15Jul 19, 2016Updated 9 years ago
- What the hell is that!?☆20Jul 5, 2018Updated 7 years ago
- Encode and decode blah code.☆18Mar 11, 2016Updated 9 years ago
- Blog developer - Summary study. [Phoenix, Rails5, Logstasher, Kibana, Suricata, mongo, elasticsearch].☆12Sep 28, 2017Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- THINK LESS, SCREAM MORE!☆11Feb 17, 2016Updated 10 years ago
- GoLismero web fingerprint population tool☆19Jul 30, 2013Updated 12 years ago
- Add breathing to your pages☆18Jan 26, 2016Updated 10 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- Let's play with canvas drawing and WebAudio API, see if something interesting might appear. A first attempt to "Code like no one's watchi…☆11Jul 30, 2023Updated 2 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- Exploiting cameras with a very distinctive HTTP Server header of "JAWS/1.0".☆10Jan 11, 2023Updated 3 years ago
- OSINT tool for Instagram☆15Feb 19, 2019Updated 7 years ago
- Implementations of most commonly used algorithms in various languages. Thanks a ton to the wiki's which provided pesudo codes☆17May 3, 2014Updated 11 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Replace images on hover with random gifs☆12Oct 26, 2018Updated 7 years ago
- Sms spoof☆10Feb 19, 2026Updated last week
- An easy user interface for pentesting tools☆11Jun 13, 2021Updated 4 years ago
- Gulp-based toolkit for WordPress theme development (Sass and ES6)☆11Apr 11, 2017Updated 8 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- Hacking environment installation scripts for OS X☆28Jan 16, 2022Updated 4 years ago
- ☆29Apr 16, 2020Updated 5 years ago
- software for the Girl Tech IM-Me☆12Mar 19, 2015Updated 10 years ago
- A quick command line utility that generates uses simple addition to obfuscate individual characters, then executes it☆16Jun 13, 2025Updated 8 months ago
- Ruby library for interacting with Bugcrowd's VRT☆14Aug 19, 2025Updated 6 months ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Jul 3, 2013Updated 12 years ago
- A quarantine-ready Wikipedia game, to be played by two people☆16Feb 6, 2025Updated last year