miguelmota / wosLinks
Monitor traffic for unencrypted data and display a dashboard.
☆15Updated 8 years ago
Alternatives and similar repositories for wos
Users that are interested in wos are comparing it to the libraries listed below
Sorting:
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 9 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- ☆60Updated 8 years ago
- Fast browser-based network discovery module☆115Updated 4 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- Detect whether an IP address belongs to a Tor exit node.☆21Updated 2 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 7 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Updated 8 years ago
- Backup scripts I use on my drives.☆25Updated 8 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 11 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- A very simple Python script to take screenshots of websites☆18Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 8 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 5 years ago
- multi-netcat in Node.JS☆30Updated 3 months ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆120Updated 3 years ago
- TORBlock is a BASH script to automatically download the list of TOR exit-nodes and add them to your IPTables ruleset.☆48Updated 13 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated last year
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate rel…☆34Updated 6 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆23Updated 7 years ago