miguelmota / wos
Monitor traffic for unencrypted data and display a dashboard.
☆15Updated 7 years ago
Alternatives and similar repositories for wos:
Users that are interested in wos are comparing it to the libraries listed below
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Spark MLib Training Models for Network Security☆16Updated 7 years ago
- ☆61Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- A website outlining my bounty hunt game.☆11Updated 5 years ago
- Hunt Open MongoDB instances☆78Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 8 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- A JavaScript clickjacking PoC generator☆23Updated 5 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- Scrape pastes from pastebin and archive them for review☆16Updated 6 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- A minimal service to detect which cryptocurrency an address corresponds to.☆26Updated 2 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- ☆19Updated 9 years ago
- Phishing Toolkit☆20Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago