wybiral / dexLinks
IoT device indexer and search engine.
☆59Updated 5 years ago
Alternatives and similar repositories for dex
Users that are interested in dex are comparing it to the libraries listed below
Sorting:
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆106Updated 10 months ago
- AKA "Internet Chemotherapy"☆64Updated 7 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- The Swiss Army knife for backend engineers.☆97Updated 4 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆119Updated 2 years ago
- Borrow CPU cycles from visitor's web browsers to crack MD5 password hashes 😲☆187Updated 4 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Takuan is a system service that parses logs and detects noisy attackers in order to build a blacklist database of known cyber offenders.☆85Updated 4 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Crash Royale Attack Kit☆40Updated 6 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆15Updated 4 years ago
- Let's brute force this hotel's tv.☆80Updated 5 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆309Updated 11 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measur…☆225Updated 3 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- SSID Probe Request Collection Workshop☆142Updated 4 years ago
- Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong t…☆99Updated 6 years ago
- Hunt Open MongoDB instances☆79Updated 5 years ago
- Web on top of any protocol☆114Updated 5 years ago
- A simple python script used to generate bit flipped versions of domain names☆23Updated 4 years ago
- Universal MITM web server☆108Updated 8 years ago
- Command line utility for parsing certificates☆64Updated 4 years ago