richardj / wqView external linksLinks
:wq
☆67Oct 25, 2018Updated 7 years ago
Alternatives and similar repositories for wq
Users that are interested in wq are comparing it to the libraries listed below
Sorting:
- code and manual for the defcon shoot 23 badge☆10Aug 10, 2015Updated 10 years ago
- Calling Objective-C libraries from Rust☆13Sep 4, 2016Updated 9 years ago
- Main Evflow event loop library☆12Oct 14, 2015Updated 10 years ago
- Python object inspector☆16Sep 5, 2022Updated 3 years ago
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- Twitter Futures for Python☆58Jun 22, 2014Updated 11 years ago
- a tool that facilitates eavesdropping and man-in-the-middle attacks☆15Mar 20, 2013Updated 12 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Just for funsies, virtual foregrounds in Zoom conference calls☆18May 5, 2020Updated 5 years ago
- A Bayesian Method for the Induction of Probalistic Networks from Data☆19Jul 6, 2017Updated 8 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Oct 28, 2015Updated 10 years ago
- Lightweight program that pollinates STHs between Certificate Transparency logs and auditors☆26Aug 7, 2025Updated 6 months ago
- python tor client☆27Sep 19, 2015Updated 10 years ago
- .Net assembly code depency inspector☆36Dec 10, 2018Updated 7 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- ripPE - section extractor and profiler for PE file analysis☆33Aug 8, 2014Updated 11 years ago
- The collection of Javascript / JScript / VBScript extensions, tools and more☆32Feb 29, 2024Updated last year
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 8 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Oct 11, 2018Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Android app for the RF430FRL152H and other NFC Type V tags.☆48Jun 25, 2020Updated 5 years ago
- GitHub Action that compares two files, add tolerances, send notifications, etc☆12Feb 4, 2026Updated last week
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Docker image for hosting and updating a private APT/YUM repository on Amazon S3☆11Aug 31, 2021Updated 4 years ago
- ☆11Dec 30, 2025Updated last month
- End-of-life (EOL) container analysis and scanning provided as a GitHub Action using https://github.com/xeol-io/xeol☆14Oct 23, 2024Updated last year
- A command-line tool that uses AWS KMS to encrypt secrets once, and decrypts them from multiple AWS regions.☆13Apr 11, 2018Updated 7 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- Markov chain generator in Dart☆35Nov 20, 2018Updated 7 years ago
- A list of your various social statii.☆35Feb 8, 2018Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Default Twisted does not ship with a CONNECT-enabled HTTP(s) proxy. This code provides one.☆51Feb 21, 2017Updated 8 years ago
- ☆10Feb 6, 2026Updated last week