Going through http://hacking-printers.net/
☆39Apr 23, 2017Updated 9 years ago
Alternatives and similar repositories for printer-hacking
Users that are interested in printer-hacking are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Maltego Local Transforms for truepeoplesearch.com☆12Jun 5, 2017Updated 8 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 2 months ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆27Apr 1, 2026Updated last month
- Disguise your MAC Address as that of any manufacturer as you want.☆10Jan 6, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- a collection of stickers and, where possible, their source files to help others make new cryptoparty flyers☆18Mar 20, 2018Updated 8 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- CVE-2016-3141☆15Apr 23, 2016Updated 10 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated last year
- Reconnaissance tool of Penetration test & Bug Bounty☆25Aug 1, 2018Updated 7 years ago
- ☆12Sep 29, 2025Updated 7 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scans NTP servers for CVE-2013-5211 NTP DDOS amplification vulnerability.☆15Sep 7, 2014Updated 11 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- A complete installed Ubuntu desktop VirtualMachine with python2 and QuantSoftwareToolkit☆16Nov 5, 2014Updated 11 years ago
- Dress Code alpha☆25Aug 3, 2014Updated 11 years ago
- Code and materials for the talk "Set practice: coding & using sets in Go"☆11Jul 8, 2025Updated 9 months ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated 3 months ago
- HID Card Reader☆15Oct 23, 2013Updated 12 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆37Jan 8, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- sshchecker is a fast dedicated ssh brute-forcing tool to check ssh login on the giving IP list.☆23Feb 8, 2026Updated 2 months ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆17Apr 30, 2021Updated 5 years ago
- ☆17Mar 19, 2021Updated 5 years ago
- Generate IDN homographs and phishing domains☆12Aug 21, 2023Updated 2 years ago
- Mass target enumeration☆32Apr 3, 2021Updated 5 years ago
- Implementation of the rough volatility model and its calibration☆10Jul 11, 2020Updated 5 years ago
- Collection of malware analysis, binary exploitation and reverse engineering related resources☆27Mar 5, 2026Updated last month
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 7 months ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- TIGMINT: OSINT (Open Source Intelligence) GUI software framework☆256Jul 29, 2021Updated 4 years ago
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago
- PKCS#11 Private Key Extractor☆11May 7, 2017Updated 8 years ago
- ☆26Apr 12, 2025Updated last year
- The official command-line client for spyse.com☆51Oct 17, 2021Updated 4 years ago
- ☆16Feb 23, 2021Updated 5 years ago
- Bing Dork Scanner and simple sqli-injection checker☆15Jun 6, 2018Updated 7 years ago