WiFi Scanner and Default WPS PIN Generator for Livebox 2.1 and Lievbox Next from Orange (Spain)
☆22Oct 5, 2021Updated 4 years ago
Alternatives and similar repositories for nmk
Users that are interested in nmk are comparing it to the libraries listed below
Sorting:
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 4 years ago
- Sqlmap for lazy people☆20Oct 1, 2020Updated 5 years ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- A simple, LFI vulnerable PHP application☆18Sep 27, 2018Updated 7 years ago
- Asqlmap is a terminal interface to automatize the famous SQL Injection's tool sqlmap. It provides a very simple interface to quickly perf…☆26May 1, 2022Updated 3 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Research on the Lenovo BIOS firmware.☆14Feb 28, 2021Updated 5 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- A small experiment on doing all of the font rendering inside of the WASM module without depending on font rendering capabilities of the b…☆19Apr 30, 2022Updated 3 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- linux debugger☆11Sep 29, 2023Updated 2 years ago
- Simple Assault cube external hack written in C☆13Apr 26, 2021Updated 4 years ago
- I hate this iPad 2☆17Feb 25, 2017Updated 9 years ago
- Broadcom Image Editor tool☆20Oct 3, 2019Updated 6 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- A rogue DNS detector☆24Nov 20, 2025Updated 4 months ago
- Zyxel VMG8823-B50B default WPA keygen☆28May 5, 2018Updated 7 years ago
- 42 header for neovim made with lua☆11Aug 17, 2022Updated 3 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Jul 30, 2022Updated 3 years ago
- Wi-Fi Machine-in-the-Middle: Automation of MitM Attack on Wi-Fi Networks☆60May 6, 2018Updated 7 years ago
- WIG (WiFi Information Gathering) is a free and open source utility for WiFi device fingerprinting.☆39Nov 28, 2022Updated 3 years ago
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Aug 30, 2021Updated 4 years ago
- A repository that contains files needed for a standalone magisk module with loadable kernel modules☆26Dec 28, 2024Updated last year
- Spam trap management☆24Jun 18, 2024Updated last year
- virus collection source code☆16Aug 18, 2019Updated 6 years ago
- IRC botnet, that's mainly used to launch denial-of-service attacks.☆30Jan 19, 2024Updated 2 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- SecDojo 23jan CTF writeup.☆14Jan 25, 2022Updated 4 years ago
- Send an email using a Proton Mail account via a python script using selenium.☆12Oct 1, 2020Updated 5 years ago
- A collection of pentesting web scanners☆36Mar 22, 2024Updated last year
- Go dance salsa somewhere :)☆12Apr 2, 2023Updated 2 years ago
- A simple browser extension that sums up the logtime of a user at https://intra.42.fr.☆16Oct 21, 2022Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- A C ransomware(educational only)☆22Feb 3, 2022Updated 4 years ago
- ☆14Oct 17, 2022Updated 3 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Nethunter Kernel for the OnePlus 7 Series running Android 10☆21May 9, 2023Updated 2 years ago