The legendary netstalking NEtwork SCAnner
☆16Nov 20, 2018Updated 7 years ago
Alternatives and similar repositories for nesca
Users that are interested in nesca are comparing it to the libraries listed below
Sorting:
- IPCamBruter v2.5.1 HIKVISION (SDK)!☆10Aug 11, 2024Updated last year
- The Good, the Bad and the Ugly: результаты частичного аудита кода Nesca☆13Jan 16, 2019Updated 7 years ago
- A script to retrieve live Hikvision DVRs using a dictionary attack☆19Jun 21, 2022Updated 3 years ago
- The legendary netstalking NEtwork SCAnner☆29Jul 23, 2020Updated 5 years ago
- :.IP webcam penetration test suit.:☆24Apr 8, 2019Updated 6 years ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 6 years ago
- ☆13May 22, 2023Updated 2 years ago
- The legendary netstalking NEtwork SCAnner☆217Aug 17, 2018Updated 7 years ago
- Damn vulnerable linux device driver for people to play with.☆28Feb 25, 2020Updated 6 years ago
- VK bot для сноса бесед☆11Feb 7, 2021Updated 5 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- ☆13Apr 9, 2020Updated 5 years ago
- Simulator of pic32 microcontroller, based on OVPsim☆16Jan 17, 2015Updated 11 years ago
- ☆36Dec 24, 2013Updated 12 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Face Recognition & FindClone☆12Nov 16, 2020Updated 5 years ago
- a simple chat server for the esp8266.☆10May 19, 2021Updated 4 years ago
- ☆10Updated this week
- MoonShard chat React Native cross platform application (iOS/Android)☆10Jan 4, 2023Updated 3 years ago
- OneWire library custom engineered for JLD505 boards with DS2480B chips☆11Jul 1, 2015Updated 10 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Гайд по нетсталкингу☆92Oct 23, 2021Updated 4 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Python program to download pictures from multiple imageboard threads like 4chan, 420chan or 7chan.☆16Nov 8, 2014Updated 11 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/libfixmath☆11Jan 25, 2016Updated 10 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- scavenger is a ruby brute forcing script that uses Typhoeus gem to enable parallelization and sends multiple http requests with various p…☆12Aug 25, 2021Updated 4 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- linux bluetoothctl wrapper (also works with arm devices like raspberry pi). Modified version of http://bitbucket.com/serkanp/bluetoothctl☆10Nov 22, 2019Updated 6 years ago
- koyu.space Android app (native)☆12Oct 29, 2021Updated 4 years ago
- Analysis and exploitation of an use-after-free in ProFTPd☆12Jun 21, 2023Updated 2 years ago
- Android Terminal Emulator☆11Nov 30, 2023Updated 2 years ago
- Генератор тестовых данных.☆11Feb 14, 2026Updated 2 weeks ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Discrete signal processing tool for side chanel data leakage attacks and analysis. Air-gapped keylogger PoC.☆11Oct 31, 2023Updated 2 years ago