vpnguy-zz / PhoneHunter
Extracting information from phone numbers
☆6Updated 8 years ago
Alternatives and similar repositories for PhoneHunter:
Users that are interested in PhoneHunter are comparing it to the libraries listed below
- Protect your parents from phishing☆39Updated 7 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Removed according to regulations☆35Updated 7 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆26Updated 7 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- NMAP Patches and NSE Scripts☆19Updated 11 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆25Updated 9 years ago
- ☆15Updated 8 years ago
- Proof of Concept for CVE-2018-11776☆20Updated 6 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 9 years ago
- Usefull snippets / Computer-security oriented☆21Updated 7 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 9 years ago
- ☆20Updated 8 years ago
- find and detect Malicious TOR Relays☆14Updated 9 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- A framework for creating modular bots/backdoors☆21Updated 9 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- hemingway is a simple and easy to use spear phishing helper.☆39Updated 8 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 8 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago