Commandline tool for searching and downloading files in LAN network, without any central server
☆294Mar 23, 2020Updated 6 years ago
Alternatives and similar repositories for iWant
Users that are interested in iWant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Simple reverse ICMP shell☆41May 17, 2013Updated 12 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- Truehunter☆30May 15, 2021Updated 4 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- define bash functions on a per-directory basis☆26Jan 20, 2024Updated 2 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆761Jun 22, 2020Updated 5 years ago
- Python framework for IT security tools☆269Jan 28, 2017Updated 9 years ago
- FUSE filesystem that presents a mirror of other filesystems, with transparent caching.☆45Jul 1, 2017Updated 8 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- pwnig all the (web)things☆21Nov 21, 2020Updated 5 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆166Jan 11, 2018Updated 8 years ago
- Download and View Skype History Without Skype☆56May 18, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆306Jan 12, 2023Updated 3 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆322Nov 3, 2019Updated 6 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆244Nov 23, 2020Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Poison, reset, spoof, redirect MITM script☆127Aug 5, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Tulpar - Web Vulnerability Scanner☆200Dec 8, 2019Updated 6 years ago
- Advanced Hash Manipulation☆175Oct 14, 2019Updated 6 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Oct 23, 2019Updated 6 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Sep 22, 2018Updated 7 years ago
- The Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting …☆86Jul 18, 2017Updated 8 years ago