Intercept and decrypt all snapchats received over your network
☆610Jul 2, 2021Updated 4 years ago
Alternatives and similar repositories for snapception
Users that are interested in snapception are comparing it to the libraries listed below
Sorting:
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Password cracking utility☆54Apr 6, 2021Updated 4 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.☆77Sep 10, 2013Updated 12 years ago
- Release of the sandy framework.☆39Sep 30, 2014Updated 11 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- Show info about the author by facebook photo url☆40Apr 7, 2017Updated 8 years ago
- Basic examples for MITMf☆16Aug 28, 2015Updated 10 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- Login Area Finder: scans host/s for login panels☆14Sep 21, 2014Updated 11 years ago
- ☆28Feb 11, 2016Updated 10 years ago
- Atmel MARC4 disassembler☆16Mar 29, 2013Updated 12 years ago
- Reverse engineering MiLight remote-controlled lightbulbs☆13May 13, 2016Updated 9 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Big Iron Recon & Pwnage☆124Nov 8, 2021Updated 4 years ago
- A network data locater using credentials obtained during penetration tests☆32Oct 30, 2013Updated 12 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Prints the IPs on your local network that're sending the most packets☆153Jul 20, 2021Updated 4 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- Tool to create large numbers of phantom Bluetooth devices.☆30Apr 1, 2013Updated 12 years ago
- Mainframe TN3270 unencrypted TSO session user ID and password sniffer☆51Jun 6, 2023Updated 2 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- Multithreaded SQL union bruteforcer☆16Sep 9, 2011Updated 14 years ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro ho…☆15Feb 19, 2016Updated 10 years ago
- Crypt and decrypt the cisco enable 7 passwords☆13Jan 24, 2022Updated 4 years ago
- Packet Acumen☆19Aug 20, 2014Updated 11 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆261Aug 6, 2016Updated 9 years ago
- Repository for the Smartphone Pentest Framework (SPF)☆456Mar 23, 2017Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Sep 24, 2014Updated 11 years ago
- Multi theaded DNS bruteforcing☆13May 7, 2014Updated 11 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Dec 22, 2013Updated 12 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago