☆15Jan 21, 2020Updated 6 years ago
Alternatives and similar repositories for sentrygun-server
Users that are interested in sentrygun-server are comparing it to the libraries listed below
Sorting:
- Rogue AP killer☆92Jan 24, 2018Updated 8 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- DHCP Snooping app - great for finding rogue DHCP servers☆35Jan 25, 2018Updated 8 years ago
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate rel…☆34Nov 10, 2019Updated 6 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Oct 30, 2019Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Collection of information security policies.☆29Apr 20, 2017Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Soundcard RFID decoder for 125KHZ HID cards.☆27Apr 2, 2016Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- [DEPRECATED] Hiccup is a framework that allows the Burp Suite (a web application security testing tool, http://portswigger.net/burp/) to …☆42Jan 2, 2019Updated 7 years ago
- ☆26Jan 18, 2026Updated last month
- ☆27May 29, 2015Updated 10 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- threejs risk-based heatmap☆12Aug 1, 2023Updated 2 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 11 years ago
- ☆11Sep 23, 2025Updated 5 months ago
- app lock android project☆16May 31, 2013Updated 12 years ago
- Rogue Access Point Detector☆37Sep 2, 2024Updated last year
- Various Wireless Driver patches☆34Apr 24, 2019Updated 6 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Fluxion is a easy to use wifi cracker, to test your own network☆11Feb 8, 2017Updated 9 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- An implementation of crypto.Signer and crypto.Decrypter for private keys resident on a TPM 2.0 device☆11Aug 6, 2025Updated 7 months ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Obfuscated Penetration Testing PowerShell scripts☆151Nov 9, 2024Updated last year
- Python script for peforming basic Evil Twin attacks on open wifi networks. Written for my tutorial on the subject.☆38Sep 20, 2016Updated 9 years ago
- A smart jamming proof of concept for mobile equipments that could be powered with Modmobmap tool☆100May 30, 2020Updated 5 years ago