leonjza / find-gw
🛰A bash script to check if you have a gateway that could get you somewhere nice.
☆14Updated 5 years ago
Alternatives and similar repositories for find-gw:
Users that are interested in find-gw are comparing it to the libraries listed below
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17Updated 5 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Generic cracker example which is compatible with Hashtopolis☆22Updated 3 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 10 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- ldid and ldid2☆13Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- scripts to setup pentesting system and use during pentest☆18Updated 2 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago