Web page preview and analysis tool
☆12Jan 11, 2023Updated 3 years ago
Alternatives and similar repositories for periscope
Users that are interested in periscope are comparing it to the libraries listed below
Sorting:
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Feb 27, 2024Updated 2 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- Collect hashes password hashes for cracking☆32Oct 22, 2013Updated 12 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- ☆23Mar 11, 2014Updated 11 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Just for funsies, virtual foregrounds in Zoom conference calls☆18May 5, 2020Updated 5 years ago
- A brute-forcing delta robot☆28Sep 17, 2014Updated 11 years ago
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- open source software for journalists to investigate all of the data in the BlueLeaks dataset☆33Updated this week
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- xResolver - Xbox Resolver and PSN Resolver with Gamertag IP Puller☆17Apr 27, 2021Updated 4 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago
- Defending against XSS in SVG files☆31Dec 29, 2019Updated 6 years ago
- Hashcat module that can crack a password used to derive an AES-128 key with CryptDeriveKey from CryptoAPI☆39Aug 29, 2023Updated 2 years ago
- a simple discord app token grabber in batch which is fully undetected☆10Aug 9, 2022Updated 3 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- retrive metadata endpoint data with these one liners.☆41Aug 11, 2020Updated 5 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Mar 26, 2020Updated 5 years ago
- A tool to scan for .DS_Store files on webservers☆35Mar 28, 2021Updated 4 years ago
- Left To My Own Devices - NT hash tools☆40Aug 4, 2022Updated 3 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- ☆10Jun 10, 2022Updated 3 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- CS-FW is a high-performance CS 1.6 firewall based on Linux XDP.☆11Aug 15, 2023Updated 2 years ago