robertdavidgraham / scan-resultsLinks
Results from some of our scans using masscan.
☆12Updated 11 years ago
Alternatives and similar repositories for scan-results
Users that are interested in scan-results are comparing it to the libraries listed below
Sorting:
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- A web app scanner☆26Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Wi-Fi Backdoors☆39Updated 9 years ago
- log file scrubber☆16Updated 6 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Generate customized and undetectable exploits for Metasploit.☆24Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Password cracking utility☆53Updated 4 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Web-based WiFi monitor☆64Updated 2 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 7 years ago
- Password scrambler - small util to make your easy passwords complicated!☆14Updated 7 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Maltego with a twist of wireless☆26Updated 10 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Search bing with python☆12Updated 10 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 10 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Wardriving ekoparty☆15Updated 7 years ago