leonjza / qrxferLinks
Transfer files from Air gapped machines using QR codes
☆111Updated 4 years ago
Alternatives and similar repositories for qrxfer
Users that are interested in qrxfer are comparing it to the libraries listed below
Sorting:
- Python bindings for hashcat☆61Updated 6 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- A starttls-capable transparent man-in-the-middle proxy☆52Updated 11 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- A web spider's worst nightmare.☆53Updated 12 years ago
- Rogue AP killer☆90Updated 7 years ago
- OS Fingerprint Obfuscation for modern Linux Kernels☆77Updated last year
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Removed according to regulations☆35Updated 8 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆219Updated 8 years ago
- Multicast DNS and DNS service discovery daemons deployed on various systems across the Internet are misconfigured and reply to queries ta…☆86Updated 3 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- Script to remove homoglyphs and zero-width characters to allow for safe distribution of documents from anonymous sources.☆138Updated 6 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 10 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Updated 8 years ago
- File transfer via DNS☆73Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Truehunter☆31Updated 4 years ago
- Anti-Anti-Automation Framework☆99Updated 11 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 9 years ago
- Reconstruct files from QR-code video data☆22Updated 7 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 9 years ago
- IPv6Tools is a robust modular framework that enables the ability to visually audit an IPv6 enabled network.☆128Updated 7 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- ☆200Updated 9 years ago