pry0cc / pdf-getLinks
A badass grabbing tool for getting PDF's of books.
☆26Updated 6 years ago
Alternatives and similar repositories for pdf-get
Users that are interested in pdf-get are comparing it to the libraries listed below
Sorting:
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 8 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- a simple, barely functional, prototyping RAT (Remote Administration Tool)☆9Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Generate customized and undetectable exploits for Metasploit.☆24Updated 8 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- ARP spoof then session jack within your browser☆28Updated 11 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- first commit☆10Updated 8 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆33Updated 8 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- Archive of leaked Equation Group materials☆15Updated 8 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆19Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆40Updated 6 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Updated 6 years ago