miguelmota / wos
Monitor traffic for unencrypted data and display a dashboard.
☆15Updated 7 years ago
Alternatives and similar repositories for wos:
Users that are interested in wos are comparing it to the libraries listed below
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 8 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- ☆61Updated 7 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Updated 8 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 8 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 8 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- A minimal service to detect which cryptocurrency an address corresponds to.☆27Updated 2 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Updated 5 years ago
- Honeypot for router backdoor (TCP 32764)☆17Updated 10 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 5 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- ☆13Updated 7 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- Apple OS X/iOS SSL flaw demonstration☆79Updated 10 years ago
- Hunt Open MongoDB instances☆78Updated 5 years ago
- A Purposefully Vulnerable Blockchain☆50Updated 3 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 9 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆30Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 3 years ago