Write simple security regression tests for your network infrastructure.
☆19Jul 4, 2012Updated 13 years ago
Alternatives and similar repositories for metacuke
Users that are interested in metacuke are comparing it to the libraries listed below
Sorting:
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 8 months ago
- 🔭 Find Hack Clubs near you!☆10Apr 18, 2019Updated 6 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames☆32Jul 26, 2011Updated 14 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- Twilio, Ionic Framework and Node.js – A Message & Call App☆24Oct 6, 2014Updated 11 years ago
- Backup scripts I use on my drives.☆25Nov 26, 2017Updated 8 years ago
- Perform obscure ip lookup for online skype accounts. Can find local and remote ip address. Require craked SkypeKit with deobfuscated debu…☆142Apr 30, 2012Updated 13 years ago
- A script that constantly opens random sites from a list to make a "smokescreen" over your browser history.☆26Feb 6, 2019Updated 7 years ago
- Fast crypto toolkit for modern client-side JavaScript☆124Jul 30, 2013Updated 12 years ago
- 🖨️ Printer: Productivity Focused Next.js CLI Tool☆11Nov 24, 2023Updated 2 years ago
- HTML Elements for IPFS.☆28Sep 28, 2017Updated 8 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- Hardening Tool for *nixes☆50Apr 22, 2017Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Adapted OS for e-ink tablets - allows to use work-related apps with no harm for eyes☆11May 17, 2020Updated 5 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Magma community documentation and processes☆10May 3, 2024Updated last year
- Radar IQ data processing using the GPU☆10Nov 12, 2025Updated 3 months ago
- Mozaïk github widgets☆11Jul 30, 2018Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43May 18, 2017Updated 8 years ago
- A lightweight solution with GUI to convert csv/Excel Tables to LaTeX☆10Dec 31, 2015Updated 10 years ago
- GitHub Dashboard using Ember.js and Twitter Bootstrap☆56Oct 26, 2012Updated 13 years ago
- ☆13Jan 6, 2023Updated 3 years ago
- ☆13Aug 17, 2020Updated 5 years ago
- small all-in-one library to program the GirlTech IM-Me☆19Dec 22, 2010Updated 15 years ago
- Rust interface to the Tor Control Protocol (TorCP)☆13Nov 1, 2021Updated 4 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Jul 29, 2013Updated 12 years ago
- RICOH THETA Plug-in template to use OpenCV in plug-ins built without the camera☆13Jan 30, 2020Updated 6 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Python Certificate Transparency client☆11Feb 8, 2015Updated 11 years ago
- NFC Bitcoin Smartcard☆13Nov 4, 2013Updated 12 years ago
- Z-height sensor board add-on for RepRapPro Ormerod 3D printer☆12Feb 9, 2026Updated 2 weeks ago
- Combine multiple subscriptions into a single subscription with multiple items☆12Jul 29, 2021Updated 4 years ago
- Python script to create simple posters, using simple phrases and background images.☆11Mar 19, 2015Updated 10 years ago
- Write great documents with markdown, then execute in the shell.☆10Sep 1, 2017Updated 8 years ago