mikeguidry / antisurveillance
I agree with mass surveillance, but not government corruption. This is the result.
☆11Updated 4 years ago
Alternatives and similar repositories for antisurveillance:
Users that are interested in antisurveillance are comparing it to the libraries listed below
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- ☆16Updated 8 years ago
- lulz: automated webstalking tool☆52Updated 8 years ago
- Python FTP Fuzzer and Ability FTP Server POC☆8Updated 9 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 7 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 10 years ago
- Download and Inject code into Google Chrome extensions☆13Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Framework for Man-In-The-Middle attacks☆15Updated 7 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- ☆12Updated 10 years ago
- log file scrubber☆16Updated 6 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- Fork of: https://gitweb.torproject.org/user/jvoisin/mat.git☆25Updated 13 years ago