leonjza / qrxferLinks
Transfer files from Air gapped machines using QR codes
☆110Updated 4 years ago
Alternatives and similar repositories for qrxfer
Users that are interested in qrxfer are comparing it to the libraries listed below
Sorting:
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- Python bindings for hashcat☆61Updated 5 years ago
- A web spider's worst nightmare.☆54Updated 12 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆128Updated 7 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Panic button for protection against cold boot attacks☆145Updated 3 years ago
- File transfer via DNS☆72Updated 8 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 6 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆76Updated last year
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆932Updated 9 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Wolves Among the Sheep☆147Updated last year
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- ☆12Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries ta…☆85Updated 3 years ago
- Hashcat Bash Scripts for bulk hash file processing☆52Updated 9 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 9 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- ☆31Updated 5 years ago
- Rogue AP killer☆90Updated 7 years ago
- find public zombie hosts for idle scanning, using shodan search and nmap☆24Updated 10 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago