scrapin' proxies with ocr
☆19Jun 19, 2018Updated 7 years ago
Alternatives and similar repositories for proxy-scrape
Users that are interested in proxy-scrape are comparing it to the libraries listed below
Sorting:
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- #7DaysOfCode Challenge. Next step #100DaysOfCode☆11May 1, 2017Updated 8 years ago
- Terminal multiplexer library. The core library for pymux, which is a pure Python tmux clone.☆12Feb 20, 2014Updated 12 years ago
- A command line file encryption tool☆10Dec 1, 2019Updated 6 years ago
- ☆10Oct 5, 2019Updated 6 years ago
- Slacker - Easy access to the Slack API and admin of workspaces/teams.☆15Apr 23, 2019Updated 6 years ago
- Download files out of open AWS buckets☆38Dec 12, 2018Updated 7 years ago
- A simple menu system for the Adafruit PiTFT for Raspberry Pi☆11Nov 23, 2016Updated 9 years ago
- Render pixel images (including animated GIFs) on 256-color ANSI terminals☆18Feb 11, 2016Updated 10 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- IPV6 MITM attack tool☆92Aug 7, 2013Updated 12 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Hardware PenTesting ToolKit for RPi and Arduino☆18Jun 12, 2020Updated 5 years ago
- ZynOS tool for automated attack on a range of IPs, find more informations at :☆74Mar 12, 2014Updated 12 years ago
- Reverse SSH Link Tool like autossh, written in Bash☆14Dec 12, 2022Updated 3 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- My docs for dev tools install and code standards☆12Apr 7, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/scapy-guide☆13Jun 15, 2015Updated 10 years ago
- This repository contains supplemental materials for the IEEE InfoVis 2018 submission "Hypothetical Outcome Plots Help Untrained Observers…☆14Oct 29, 2018Updated 7 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- A scraping and aggregating package using the CollegeFootballData API☆11Dec 11, 2020Updated 5 years ago
- Scripts for automating actions in Cobalt Strike☆11Jul 1, 2016Updated 9 years ago
- Container Registry Synchronization made easy and fast☆12Oct 7, 2021Updated 4 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Nov 18, 2016Updated 9 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- A command-line URL parser, written in Go☆11Jul 17, 2017Updated 8 years ago
- An urwid based TUI front end for pass, the standard unix password manager.☆20Nov 17, 2022Updated 3 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Public version of dopescope code☆14Jan 31, 2017Updated 9 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- Vulnerability Scanner☆11Dec 23, 2014Updated 11 years ago