nyxgeek / nyxgeek-readinglistLinks
hacker folklore, history, and culture
☆13Updated last year
Alternatives and similar repositories for nyxgeek-readinglist
Users that are interested in nyxgeek-readinglist are comparing it to the libraries listed below
Sorting:
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- Windows productivity tweaks☆15Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Side Channel script☆25Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Framework for Man-In-The-Middle attacks☆14Updated 7 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- A simple yet beautiful phishing proxy.☆57Updated 4 years ago
- [BASH] Password generator through a wordlist☆11Updated 12 years ago
- flood area with fake essids☆21Updated 8 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆50Updated 8 years ago
- Linkedin Employee Profile Scrapper☆66Updated 2 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- Custom password cracking rules for Hashcat and John the Ripper☆91Updated last year
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆47Updated 8 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Updated 8 years ago
- Tools and scripts dedicated to Android application security☆50Updated 4 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 3 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- Just some random stuff for AppLocker☆17Updated 6 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 5 years ago
- ☆17Updated last year
- PowerShellUtilities provides various utility commandlets.☆51Updated 5 years ago