A proxy server for cookie sidejacking. Works with 'ferret'.
☆56May 18, 2016Updated 9 years ago
Alternatives and similar repositories for hamster
Users that are interested in hamster are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A continuation of my 'ferret' project that extracts useful information from networks.☆22Jul 20, 2014Updated 11 years ago
- Web-based WiFi monitor☆68Oct 18, 2022Updated 3 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Jun 21, 2017Updated 8 years ago
- Parses DNS responses in a secure, rigorous manner☆22Jul 24, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Oct 27, 2016Updated 9 years ago
- ☆13Sep 30, 2020Updated 5 years ago
- Simple examples of integrating the Lua scripting language into C programs.☆24Nov 26, 2018Updated 7 years ago
- A lightweight/secure honeypot using Lua scripts.☆26Mar 5, 2021Updated 5 years ago
- A simple implementation of an 'echo' (port 7) server using epoll (Linux), kqueue (FreeBSD), and IOCompletionPorts (Windows).☆14Nov 19, 2018Updated 7 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- Logs incoming attempts to connect to NetBIOS/SMB☆14May 15, 2017Updated 8 years ago
- A non-math, but still technical, guide to cryptography☆24Jul 24, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Snort/Suricata DAQ module with DPDK patch☆11Apr 10, 2024Updated 2 years ago
- automated penetration toolkit☆12Jul 9, 2016Updated 9 years ago
- The Monty Hall problem, in JavaScript☆13Oct 1, 2017Updated 8 years ago
- ☆12Nov 9, 2017Updated 8 years ago
- ☆15Sep 24, 2015Updated 10 years ago
- Created by Denis Podgurskiy via the GitHub Connector☆13May 20, 2021Updated 4 years ago
- Tor Web Scraper, dnmap CnC, and Forensic Disk Analyzer☆17May 25, 2017Updated 8 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆1,012Jul 31, 2021Updated 4 years ago
- Clickjacking Proof-of-Concept Exploit☆26Oct 1, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- A program that uses xapian to index the flat file databases used by nfdump or flow-tools☆36Mar 26, 2018Updated 8 years ago
- PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure☆65Aug 1, 2015Updated 10 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Nov 11, 2013Updated 12 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 3 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Jun 30, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- The Bi-directional Link Extractor.☆53Apr 20, 2017Updated 8 years ago
- Engine for communication with remote kernel debugger (KD, WinDbg) from drivers and applications☆37Jun 8, 2013Updated 12 years ago
- Create lists from nmap output.☆13Jan 27, 2021Updated 5 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- Sample list of penetration test reports☆18Dec 12, 2016Updated 9 years ago
- Bouncing DVD Logo☆11Apr 23, 2025Updated 11 months ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago