s0lst1c3 / sentrygun-serverView external linksLinks
β15Jan 21, 2020Updated 6 years ago
Alternatives and similar repositories for sentrygun-server
Users that are interested in sentrygun-server are comparing it to the libraries listed below
Sorting:
- Rogue AP killerβ91Jan 24, 2018Updated 8 years ago
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. ππ»β11Feb 22, 2017Updated 8 years ago
- DHCP Snooping app - great for finding rogue DHCP serversβ35Jan 25, 2018Updated 8 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)β19Jul 7, 2015Updated 10 years ago
- π Don't let threats reach your machines β USB Mass Storage Gatewayβ17Oct 30, 2019Updated 6 years ago
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate relβ¦β34Nov 10, 2019Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.β22Dec 1, 2017Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shellβ19Sep 15, 2015Updated 10 years ago
- Collection of information security policies.β29Apr 20, 2017Updated 8 years ago
- Soundcard RFID decoder for 125KHZ HID cards.β27Apr 2, 2016Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.β31Feb 17, 2014Updated 11 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to β¦β42Jan 2, 2019Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLYβ23Sep 2, 2018Updated 7 years ago
- β26Jan 18, 2026Updated 3 weeks ago
- π π€₯πIf threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxyβ24Jun 18, 2018Updated 7 years ago
- β27May 29, 2015Updated 10 years ago
- gnuradioβ26Nov 29, 2019Updated 6 years ago
- The Swiss army knife of byte manipulationβ43Oct 9, 2016Updated 9 years ago
- Modular tool to test exfiltration techniques.β37Apr 27, 2017Updated 8 years ago
- Β΅phisher spear phishing tool (reference implementation)β40Jun 26, 2020Updated 5 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.β34Nov 12, 2016Updated 9 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is likeβ¦β26May 12, 2016Updated 9 years ago
- app lock android projectβ16May 31, 2013Updated 12 years ago
- Web shells for use in penetration testingβ41Mar 5, 2015Updated 10 years ago
- β11Sep 23, 2025Updated 4 months ago
- Remote Access Trojan(RAT), Miner, DDoSβ35Nov 14, 2016Updated 9 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devicesβ33Aug 1, 2016Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)β16May 3, 2014Updated 11 years ago
- threejs risk-based heatmapβ12Aug 1, 2023Updated 2 years ago
- Automated Linux evil maid attackβ435Dec 22, 2015Updated 10 years ago
- A program to map out SPF and DKIM records for a large number of domainsβ39Apr 1, 2015Updated 10 years ago
- Inject shellcode into running processes in Linux.β43Jul 10, 2024Updated last year
- An implementation of crypto.Signer and crypto.Decrypter for private keys resident on a TPM 2.0 deviceβ11Aug 6, 2025Updated 6 months ago
- Fluxion is a easy to use wifi cracker, to test your own networkβ11Feb 8, 2017Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitationβ15Feb 23, 2018Updated 7 years ago
- Automate ISSG Tool Setupsβ13Nov 21, 2024Updated last year
- π₯π₯π₯ AI security automation platform. Build visual workflows, deploy autonomous agents, and automate threat detection and response. 80+β¦β27Updated this week
- Dump macOS 1.8+ password hashes to a hashcat-compatible formatβ14May 29, 2022Updated 3 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!β12Feb 5, 2018Updated 8 years ago