pry0cc / pdf-getLinks
A badass grabbing tool for getting PDF's of books.
☆26Updated 7 years ago
Alternatives and similar repositories for pdf-get
Users that are interested in pdf-get are comparing it to the libraries listed below
Sorting:
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 9 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆36Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Updated 6 years ago
- 📡 A security research tool with shodan integration☆25Updated 7 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 8 years ago
- This version touches disk for registry persistence.☆26Updated 10 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Get clients and access points.☆48Updated 6 years ago
- Determine everything you need to know to about a system☆32Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆37Updated 4 years ago
- Massive arsenal of hacker tools...☆78Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 10 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Updated 8 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆16Updated 9 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 11 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 9 years ago