thehappydinoa / TP-Link-defaultsView external linksLinks
Python script for trying default passwords for some TP-Link Hotspots
☆35Apr 29, 2021Updated 4 years ago
Alternatives and similar repositories for TP-Link-defaults
Users that are interested in TP-Link-defaults are comparing it to the libraries listed below
Sorting:
- Ubuntu stealer, steal ubuntu information in local pc☆21Jan 16, 2020Updated 6 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 2 years ago
- This Burp Suite extension allows you to customize header with put a new header into HTTP REQUEST BurpSuite (Scanner, Intruder, Repeater, …☆53Mar 29, 2023Updated 2 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆20Jan 22, 2017Updated 9 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- streamlink-cam4 lets you follow and archive your selected models shows on www.cam4.com☆12Sep 18, 2021Updated 4 years ago
- Python scripts for easy and anonymous cam4 recordings.☆10Mar 18, 2024Updated last year
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 5 months ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆85May 10, 2018Updated 7 years ago
- Tool to brute website sub-domains and dirs.☆49May 13, 2020Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- ☆176Jul 5, 2023Updated 2 years ago
- Recriando UI-UX do Nubank para fins de Estudo.☆10Dec 10, 2022Updated 3 years ago
- ☆16May 9, 2016Updated 9 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆69Jan 15, 2026Updated 3 weeks ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Malware detection using learning and information retrieval for Android☆74Aug 11, 2020Updated 5 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also you …☆45May 6, 2019Updated 6 years ago
- TCP Asynchronous Socket - Remote Administration Tool☆10Dec 1, 2018Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- ☆29Jul 4, 2020Updated 5 years ago
- Ransomeware attack in linux☆14Aug 12, 2018Updated 7 years ago
- Scanner for document roots/URLs.☆14Nov 17, 2011Updated 14 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago