miguelmota / wos
Monitor traffic for unencrypted data and display a dashboard.
☆15Updated 7 years ago
Alternatives and similar repositories for wos:
Users that are interested in wos are comparing it to the libraries listed below
- ☆61Updated 7 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆33Updated 8 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 3 years ago
- A very simple Python script to take screenshots of websites☆17Updated 7 years ago
- Scans an internal network using massscan and nmap☆20Updated last year
- Python script based on aireplay-ng to keep deauthenticating the specified stations from your WiFi network.☆50Updated 8 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 4 years ago
- Scans crossdomain.xml policies for expired domain names.☆25Updated 9 years ago
- A JavaScript clickjacking PoC generator☆22Updated 5 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆41Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago
- Puny Domain Name Check☆36Updated 5 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- Spark MLib Training Models for Network Security☆16Updated 6 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆30Updated last year
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- ☆13Updated 7 years ago
- DirBuster for Node.js☆20Updated 5 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 2 years ago