miguelmota / wos
Monitor traffic for unencrypted data and display a dashboard.
☆15Updated 7 years ago
Alternatives and similar repositories for wos:
Users that are interested in wos are comparing it to the libraries listed below
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- Hunt Open MongoDB instances☆78Updated 5 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- The PoC files for ethereum client's JSON-RPC DNS Rebinding☆35Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 8 years ago
- extracts urls from text☆16Updated 6 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- A very simple Python script to take screenshots of websites☆18Updated 7 years ago
- ☆61Updated 7 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- A Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updat…☆21Updated 7 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- ESPot - ElasticSearch Honeypot☆27Updated 10 years ago