techgaun / printer-hacking
Going through http://hacking-printers.net/
☆30Updated 7 years ago
Related projects: ⓘ
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Rogue Access Point Detector☆35Updated 2 weeks ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆35Updated last year
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆50Updated 6 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆45Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- LFI (Local File Inclusion) Exploitation Tool☆18Updated 3 years ago
- A quick reference script that can easily display reverse shells for different languages.☆19Updated 4 years ago
- ☆13Updated 11 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆71Updated 4 years ago
- Get clients and access points.☆48Updated 5 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆39Updated 2 years ago
- Simple Karma Attack☆66Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- Hashes of infamous malware☆24Updated last year
- A subdomain reconnaissance scanner☆35Updated last year
- Simple Script to query hash databases APIs☆15Updated 5 years ago
- Shodan Port Scanner☆40Updated 3 years ago
- recon-ng modules for Censys☆36Updated 10 months ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 5 months ago
- Report and finding templates used by the Serpico reporting tool☆15Updated 5 years ago
- A ping detection tool for linux☆23Updated 4 years ago
- The New Hacking Framework☆18Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- A defense tool - detect web shells in local directories via md5sum☆31Updated 5 years ago
- ☆20Updated last year
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆33Updated 4 years ago
- ☆17Updated this week
- CHEAT SHEET DE SEGURIDAD PARA ETHICAL HACKING & PENETRATION TESTING☆22Updated 7 years ago
- Script is a proof of concept how to control your machine by using social media sites.☆17Updated 6 years ago