vpnguy-zz / PhoneHunter
Extracting information from phone numbers
☆5Updated 8 years ago
Alternatives and similar repositories for PhoneHunter:
Users that are interested in PhoneHunter are comparing it to the libraries listed below
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Protect your parents from phishing☆39Updated 7 years ago
- ☆15Updated 8 years ago
- Removed according to regulations☆35Updated 7 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Usefull snippets / Computer-security oriented☆21Updated 8 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- ~ BannerGrab☆26Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 7 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- ☆22Updated 8 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆17Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago