t4d / Sn0fferLinks
Sn0ffer - Make sound/noise/music with your network connection!
☆20Updated 9 years ago
Alternatives and similar repositories for Sn0ffer
Users that are interested in Sn0ffer are comparing it to the libraries listed below
Sorting:
- Database of Internet Facing TN3270 Mainframes☆23Updated 10 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Updated 10 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- Documents pertaining to internal policies and guidelines☆12Updated 9 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Updated 10 years ago
- Malicious Link Blog☆25Updated 2 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 4 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 6 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- Wifi-Biter is a dictionary generator used to generate dictionaries/wordlist for Wireless Router Passwords.☆14Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Hunting cryptonote-related miners☆23Updated 5 years ago
- security in a box - tools and tactics for your digital security☆20Updated 10 years ago
- Lite version of PDF X-RAY that uses no backend☆38Updated 14 years ago
- CLI tools using Harpoon features☆24Updated 2 years ago
- A Passive DNS backend and collector☆33Updated 3 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 3 months ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆148Updated 3 years ago
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- Browser extension that complements the PhishDetect service☆24Updated 3 years ago
- ☆63Updated 10 years ago
- Every document published from the Snowden archive☆73Updated 10 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Updated 11 years ago
- Distributed Honeypot☆63Updated 7 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆54Updated 4 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 11 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Updated last year
- Simple python wrapper for the Robtex API (see https://www.robtex.com/api/).☆13Updated 4 years ago