nicolas-thill / hostilewrt
An embedded wireless security audit system
☆22Updated 11 years ago
Related projects: ⓘ
- Simple script for PGP encrypted newsletter☆26Updated 8 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 9 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 9 years ago
- Extract, defang, resolve names and IPs from text☆22Updated 8 months ago
- ☆11Updated this week
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- parse Tor consensus to generate google maps and google earth KML of tor relays☆11Updated 11 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- Browser extension that complements the PhishDetect service☆20Updated last year
- Passive Bitcoin Project☆10Updated 9 years ago
- secure messaging, file-transfer, and directory synchronization☆42Updated 7 years ago
- The web site☆15Updated last year
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 7 years ago
- ☆11Updated 3 years ago
- Perl library for SHODAN☆17Updated 10 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆17Updated 10 years ago
- Detect passive activity in the Tor-network☆13Updated 9 years ago
- Mirror of freehaven's anonymous research bibliography☆13Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 8 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- miscellaneous scripts and things...☆21Updated 8 years ago
- Server & client software for Firewall Cafe☆3Updated 10 months ago
- Ruby API client for the Censys internet-wide network-scan search engine☆9Updated last week
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 9 months ago
- Small program to read lists of Tor exit nodes and draw picture showing when they join/leave list☆28Updated 8 years ago
- Spam trap management☆22Updated 3 months ago
- ☆29Updated this week
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- ☆11Updated this week