shmilylty / generate-and-crack-identity-cardView external linksLinks
generate and crack identity card
☆61Apr 3, 2017Updated 8 years ago
Alternatives and similar repositories for generate-and-crack-identity-card
Users that are interested in generate-and-crack-identity-card are comparing it to the libraries listed below
Sorting:
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- It is a dedicated requests lib that supports cookie, headers, get/post, etc. And it also supports rendering the response (e.g. Javascript…☆86Sep 12, 2017Updated 8 years ago
- Application to take over mining destination of remote cgminer instances via RPC interface.☆25Jul 5, 2016Updated 9 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- PyRat,a rat by python xmlrpc☆162Mar 23, 2018Updated 7 years ago
- 仓库已经废弃,新仓库地址☆47May 26, 2017Updated 8 years ago
- a management tool☆35Dec 8, 2022Updated 3 years ago
- a very fast brute force webshell password tool☆654Apr 17, 2023Updated 2 years ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 8 years ago
- Most powerfull Wifi Jammier.with fixes.☆12Oct 14, 2022Updated 3 years ago
- Leech Tools (Free Version) provides fraud tools such us Credit Card Generator, Bank Identification Number Lookup and Credit Card Validity…☆11May 9, 2019Updated 6 years ago
- ssrf、ssrfIntranetFuzz、dnsRebinding、recordEncode、dnsPoisoning、Support ipv4/ipv6☆217Aug 17, 2017Updated 8 years ago
- Fetch Geo data from iPhone backups☆14Apr 22, 2011Updated 14 years ago
- Example of intel virtualization extensions usage☆10Dec 15, 2016Updated 9 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- 企业ip网段快速收集☆12Sep 25, 2023Updated 2 years ago
- ☆11Apr 16, 2016Updated 9 years ago
- 批量扫描CVE-2020-5902,远程代码执行,已测试☆10Jul 9, 2020Updated 5 years ago
- F-Scrack is a single file bruteforcer supports multi-protocol☆310Sep 5, 2017Updated 8 years ago
- 一个可以自定规则的动扫描器,支持主动和被动扫描☆25Oct 26, 2021Updated 4 years ago
- 本项目仅用于记录团队内部分享议题及一些大事件,记录团队成长的过程。☆10Apr 2, 2019Updated 6 years ago
- Parse and stringify URL query strings☆13Aug 1, 2018Updated 7 years ago
- go-attacker☆10Jun 12, 2019Updated 6 years ago
- Monitor and prevent unexpected behavior of Java programs.☆14Jul 6, 2021Updated 4 years ago
- ☆15Aug 12, 2009Updated 16 years ago
- ☆11Mar 14, 2019Updated 6 years ago
- 用于渗透测试、安全运维的插件化并发框架,自写插件可进行-PoC测试、子域发现、端口扫描等。☆14Feb 9, 2021Updated 5 years ago
- Evil Linux kernel module that hooks sys_read system call and lets a user get a reverse shell or execute shellcode in the kernel.☆15Mar 12, 2022Updated 3 years ago
- Recovering data from the iPhone Ipod Touch corrupted backups☆13Oct 29, 2016Updated 9 years ago
- ☆14Mar 28, 2018Updated 7 years ago
- DOOM是在thorn上实现的分布式任务分发的ip端口漏洞扫描器☆136Dec 1, 2015Updated 10 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Will to be a niubility scan-framework☆519Jul 1, 2025Updated 7 months ago
- Feigong,针对各种情况自由变化的mysql注入脚本,In view of the different things freely change the mysql injection script☆107Jan 24, 2017Updated 9 years ago
- Vulnerability Labs for security analysis☆1,172Mar 10, 2021Updated 4 years ago
- Vulnerability Verification Environment based on Docker☆111Jun 17, 2019Updated 6 years ago
- CVE-2018-7600 Drupal RCE☆114Apr 18, 2018Updated 7 years ago