Commandline tool for searching and downloading files in LAN network, without any central server
☆294Mar 23, 2020Updated 6 years ago
Alternatives and similar repositories for iWant
Users that are interested in iWant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Simple reverse ICMP shell☆41May 17, 2013Updated 13 years ago
- Take actions when specific devices appear/disappear from your LAN☆16Oct 18, 2023Updated 2 years ago
- A tool to help you manage your leaks☆35Nov 22, 2017Updated 8 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆176Dec 1, 2022Updated 3 years ago
- Truehunter☆30May 15, 2021Updated 5 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆760Jun 22, 2020Updated 5 years ago
- Python framework for IT security tools☆269Jan 28, 2017Updated 9 years ago
- FUSE filesystem that presents a mirror of other filesystems, with transparent caching.☆46Jul 1, 2017Updated 8 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 11 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- pwnig all the (web)things☆21Nov 21, 2020Updated 5 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Disable some spyware on Windows 7/8/8.1☆15Feb 11, 2019Updated 7 years ago
- Analyse SQL injection attempts in web server logs☆82Jan 11, 2017Updated 9 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆166Jan 11, 2018Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Download and View Skype History Without Skype☆55May 18, 2018Updated 8 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆308Jan 12, 2023Updated 3 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆322Nov 3, 2019Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆246Nov 23, 2020Updated 5 years ago
- Cromos is a tool for downloading legitimate extensions of the Chrome Web Store and inject codes in the background of the application.☆126Dec 13, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Clear diverses Logs and History Files saved by Windows.☆23Oct 24, 2017Updated 8 years ago
- Poison, reset, spoof, redirect MITM script☆128Aug 5, 2023Updated 2 years ago
- Tulpar - Web Vulnerability Scanner☆201Dec 8, 2019Updated 6 years ago
- Advanced Hash Manipulation☆176Oct 14, 2019Updated 6 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Oct 23, 2019Updated 6 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago