☆53Apr 3, 2024Updated 2 years ago
Alternatives and similar repositories for Comet
Users that are interested in Comet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆43Apr 3, 2024Updated 2 years ago
- ☆54Apr 3, 2024Updated 2 years ago
- Fully automated Data Forensics / Recovery bot to recover, undelete, index, and organize as much as possible for any hard drive, and optio…☆13Feb 5, 2024Updated 2 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆13May 20, 2021Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 18, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A localhost implementation of a botnet used to perform a credential stuffing attack☆13Jan 14, 2021Updated 5 years ago
- KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their d…☆13Dec 8, 2018Updated 7 years ago
- Correction and installation of WIFITE's HCX dependencies/Correção e instalação das dependências HCX do WIFITE☆13Dec 21, 2023Updated 2 years ago
- ☆13Sep 30, 2021Updated 4 years ago
- hackathon, hacking-tool, termux-hacking, termux-environment, nitro-friendly☆10Sep 17, 2020Updated 5 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Feb 27, 2018Updated 8 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 11 years ago
- This Project will let you install termux black . metasploit , various tools and Kali Nethunter Rootless without any error in your Termux.☆17Sep 14, 2020Updated 5 years ago
- Wi-Fi based covert channel that hides information in hand crafted acknowledgement frames imitating additional channel effects that can be…☆26Apr 1, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- These are favored by companies who deal with sensitive information to prevent leaks. The 5GHz WiFi jammer is effective up to 40 meters an…☆18May 1, 2021Updated 4 years ago
- Accurately Locate Smartphones using Social Engineering☆13Jun 3, 2020Updated 5 years ago
- Spy-Bot: A Cloud Penetration Testing Approach for Wireless Penetration Testing.☆18Nov 2, 2017Updated 8 years ago
- Evil Twin Attack Bash script☆12Feb 21, 2016Updated 10 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- 💡📢Dev Mint has an exclusive collection of layouts, animations, effects, code snippets, extensions, projects, resources etc. to fulfill …☆17Mar 7, 2025Updated last year
- a Netflix Checker made with Selenium☆22Nov 25, 2020Updated 5 years ago
- Profile Of NigeriaPresidents who has ruled from 1960 till date☆24Jun 19, 2024Updated last year
- The tool generates a malicious HTTPS page using Ngrok Port Forwarding method, and a javascript code to perform cam requests using MediaDe…☆29May 16, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Generate and validate United Kingdom national insurance numbers using PHP or JavaScript.☆31Mar 2, 2012Updated 14 years ago
- Use onlinehashcrack.com api with python to crack rar,zip,cap,docx etc.. 20 million+ wordlist and hybrid bruteforce.☆20Mar 17, 2021Updated 5 years ago
- ☆25Oct 2, 2021Updated 4 years ago
- I store whatever i learn in this website.☆34Feb 7, 2026Updated 2 months ago
- ABA/routing number validation tools☆41Mar 23, 2012Updated 14 years ago
- Moonbounce is graphical user interface for using an OpenVPN client and server with Pluggable Transport support. The goal of Moonbounce is…☆37Apr 25, 2024Updated last year
- Facebook Hacking Menu☆38Apr 25, 2020Updated 5 years ago
- Multiple-in-one calculator, by JavaScript, HTML & CSS☆28Mar 18, 2023Updated 3 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Facebook bot dumper&scraper☆41Oct 13, 2024Updated last year
- A community-driven dictionary that simplifies software, engineering and tech terms for all levels.☆53Mar 4, 2026Updated last month
- A well-designed, interesting game where a user can play with their favourite edible and click it to get the highest score.☆30Dec 19, 2024Updated last year
- This project contains the nexmon-based source code required to repeat the experiments of our WiSec 2017 paper.☆65Sep 6, 2017Updated 8 years ago
- Hosted Reverse Shell generator with a ton of functionality (thanks 0day!)☆42Sep 24, 2024Updated last year
- Wireless EMP (WEMP) - A simple shell script that kicks all devices off of a network for as long as desired☆35Feb 1, 2017Updated 9 years ago
- Capture WPA handshakes, using besside-ng. Auto upload to http://wpa-sec.stanev.org for cracking the password.☆44Feb 20, 2021Updated 5 years ago