subgraph / macouflage-multi
One-pass MAC spoofer for multiple devices (based on libmacouflage).
☆16Updated 7 years ago
Alternatives and similar repositories for macouflage-multi
Users that are interested in macouflage-multi are comparing it to the libraries listed below
Sorting:
- ☆12Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 9 years ago
- A collection of tools and resources to explore MPTCP on your network. Initially released at Black Hat USA 2014.☆61Updated 10 years ago
- You'll never take me alive.☆86Updated 11 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆54Updated 7 years ago
- ☆30Updated 10 years ago
- Deterministic kernel build scripts, for Linux, mainly for Debian☆47Updated 9 years ago
- Mirror of freehaven's anonymous research bibliography☆14Updated 10 years ago
- Simple multi-stream protocol for use with ZigBee wireless modules. Adds an additional layer of encryption and allows advanced streams suc…☆10Updated 10 years ago
- Domain cralwer for various sites/databases☆9Updated 6 years ago
- Bash integer overflow in braces☆11Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 9 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 9 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- A better SSL cipher checker using gnutls☆28Updated 8 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- The web site☆14Updated 2 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- A Quick POC To Show Why You Should Disable/Cover Your Webcam☆19Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Enabling 2fac confirmation for newly connected USB devices☆45Updated 8 years ago
- YAPDNS☆39Updated 9 years ago