trustedsec / conqr
ConQR is an open source ticketing system for conferences to issue QRCode's in a quick, efficient, and easy manner.
☆74Updated 8 years ago
Alternatives and similar repositories for conqr:
Users that are interested in conqr are comparing it to the libraries listed below
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 11 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆34Updated 8 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Maltego Transforms, Machines and other extentions☆44Updated 9 years ago
- uses keywords from alert logs to send SMS☆24Updated 9 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 8 years ago
- SlyPI☆18Updated 11 years ago
- Malicious Link Blog☆24Updated last year
- Scripts used for phishing campaigns☆14Updated 10 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Suite for Information gathering☆12Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- Modular tool to test exfiltration techniques.☆37Updated 7 years ago
- Easy Window domain access☆51Updated 10 years ago
- Maltego with a twist of wireless☆25Updated 10 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 12 years ago
- Network Infrastructure Penetration Testing Tool☆10Updated 10 years ago
- µphisher spear phishing tool (reference implementation)☆39Updated 4 years ago
- ☆15Updated 8 years ago
- Search bing with python☆12Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Collection of information security policies.☆29Updated 7 years ago