miguelmota / wosLinks
Monitor traffic for unencrypted data and display a dashboard.
☆15Updated 8 years ago
Alternatives and similar repositories for wos
Users that are interested in wos are comparing it to the libraries listed below
Sorting:
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 9 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 8 years ago
- Fast browser-based network discovery module☆115Updated 4 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- Backup scripts I use on my drives.☆25Updated 8 years ago
- A very simple Python script to take screenshots of websites☆18Updated 8 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- A website outlining my bounty hunt game.☆11Updated 6 years ago
- A Purposefully Vulnerable Blockchain☆52Updated 4 years ago
- ☆68Updated 4 years ago
- ☆91Updated 8 years ago
- Docker container to run PoisonTap☆15Updated 9 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Updated 8 years ago
- ☆19Updated 10 years ago
- A JavaScript clickjacking PoC generator☆24Updated 6 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆125Updated 8 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆78Updated 7 years ago
- A Upnp exploitation tool.☆107Updated 6 years ago
- ☆60Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 11 years ago
- multi-netcat in Node.JS☆30Updated 4 months ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 5 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Updated 12 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago