miguelmota / wosLinks
Monitor traffic for unencrypted data and display a dashboard.
☆15Updated 8 years ago
Alternatives and similar repositories for wos
Users that are interested in wos are comparing it to the libraries listed below
Sorting:
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31Updated 9 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 9 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Multi-head SSH honeypot system.☆22Updated last year
- Fast browser-based network discovery module☆115Updated 4 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆120Updated 3 years ago
- ☆60Updated 8 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 7 years ago
- Unofficial WhatCMS API package☆41Updated 4 years ago
- A very simple Python script to take screenshots of websites☆18Updated 8 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆22Updated 7 years ago
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated 11 months ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- Scrape pastes from pastebin and archive them for review☆17Updated 6 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆76Updated 5 years ago
- A honeypot proxy for mongodb. When run, this will proxy and log all traffic to a dummy mongodb server.☆92Updated 2 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 4 years ago
- A simple Pastebin monitor which looks for interesting things and saves them to disk.☆51Updated 4 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 11 years ago
- XSS exploitation tool - access victims through HTTP proxy☆160Updated 11 years ago
- ☆91Updated 8 years ago