marshki / pyWypeLinks
Securely wipe the contents of storage device using Python 2 & 3. Project needs to be refactored, and is starving for unit tests. Works, but it ain't so pretty.
☆10Updated 5 months ago
Alternatives and similar repositories for pyWype
Users that are interested in pyWype are comparing it to the libraries listed below
Sorting:
- Find all cool documents on GOV and Info sites☆18Updated 6 years ago
- Steals chrome and firefox cookies and upload to the server using POST api.☆10Updated 9 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Updated 8 years ago
- flood area with fake essids☆20Updated 8 years ago
- A repository of Tor hidden services.☆65Updated 4 years ago
- ☆12Updated 8 years ago
- Cosmetic and tracking filters for uBlock Origin and Nano Adblocker.☆12Updated 5 months ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆20Updated 8 years ago
- A graphical user interface for the medusa brute forcing utility. http://wiki.taksmind.com//index.php?title=Medusa-gui☆40Updated 8 years ago
- Reuploading the code she removed.☆14Updated 6 years ago
- Steam, Dota, CSGO, TF2, PUBG Scam Site Filter list☆12Updated 2 years ago
- Python program that denies internet access to a target within a local network...☆22Updated 4 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Updated 2 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Updated 6 years ago
- Files to include in the package parrot-core.☆54Updated last week
- Windows Auto Post Exploitation - For ReD Team☆15Updated 6 years ago
- ☆70Updated 7 years ago
- Personal lists containing additional filters to adblock domains.☆14Updated 5 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Updated 12 years ago
- Python wireless library for Linux.☆44Updated 3 years ago
- FIREWALL EXPLOITS COPY OF NSA EQUATION GROUP SHADOW BROKERS☆20Updated 9 years ago
- what's dark net☆19Updated 8 years ago
- Manage the metasploit framework database☆16Updated 5 years ago
- This docker image packs the amazing Hak5C² software☆29Updated 3 years ago
- TorGhost redirects all your internet traffic through SOCKS5 Tor proxy.☆64Updated last year
- AES Ransomware in batch☆11Updated last year
- SubZone - Subdomains, Dns records, & more! || Python tutorial || Certificate authority abuse || Adavnced || Hacking/Info-Sec ||☆42Updated 10 months ago
- scripts to setup pentesting system and use during pentest☆19Updated 3 years ago
- wifi attacks suite☆59Updated 5 years ago