samyk / webscanLinks
Browser-based network scanner & local-IP detection
☆462Updated 4 years ago
Alternatives and similar repositories for webscan
Users that are interested in webscan are comparing it to the libraries listed below
Sorting:
- A tool for IDN homograph attacks and detection.☆741Updated 4 years ago
- caplets and proxy modules.☆511Updated 7 months ago
- The request.bin of DNS request☆238Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆505Updated 4 years ago
- High speed/Low cost CommonCrawl RegExp in Node.js☆258Updated last year
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆478Updated 3 years ago
- Private key usage verification☆432Updated 7 months ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- bettercap's web UI☆348Updated 3 months ago
- A ZigBee hacking toolkit by Bishop Fox☆287Updated 4 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆656Updated 3 years ago
- Python API wrapper and command-line client for the tools hosted on spyse.com.☆273Updated 5 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆243Updated 9 months ago
- A fast and secure multi protocol honeypot.☆326Updated 3 years ago
- SensePost's modified hostapd for wifi attacks.☆590Updated last year
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆638Updated 2 years ago
- Quickjack is a point-and-click tool for intuitively producing advanced clickjacking and frame slicing attacks.☆244Updated 2 years ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆378Updated last year
- A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover support☆301Updated last week
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆297Updated last year
- WHID Elite is a GSM-enabled Open-Source Multi-Purpose Offensive Device that allows a threat actor to remotely inject keystrokes, bypass a…☆263Updated 2 years ago
- Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!☆210Updated 4 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- Zero Infrastructure Password Cracking☆411Updated last year
- Evil client portion of EAP relay attack☆206Updated 2 years ago
- Modern alternative to dirbuster/dirb☆396Updated last year
- Perform advanced MiTM attacks on websites with ease 💉☆681Updated last year
- Nameserver DNS poisoning attacks made easy☆525Updated 8 years ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.☆257Updated 3 years ago
- Web-based reverse shell generator☆173Updated 4 years ago