joshterrill / twilio-autodialerLinks
  an autodialer written in nodejs using the twilio api (not functional)
☆11Updated 10 years ago
Alternatives and similar repositories for twilio-autodialer
Users that are interested in twilio-autodialer are comparing it to the libraries listed below
Sorting:
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆45Updated 9 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Advanced HTTP fingerprinting PoC☆45Updated 8 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- ☆12Updated 8 years ago
- Teensy code to brute force a keylogger's unlock code☆15Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Updated 10 years ago
- An implementation of the hashcat rules engine in javascript☆49Updated 7 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Updated 5 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆29Updated 8 years ago
- Multiple XSS Pocs (some server via gh-pages)☆16Updated 8 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆110Updated 8 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 11 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- Service desk password tools.☆16Updated 8 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago