wybiral / dex
IoT device indexer and search engine.
☆59Updated 5 years ago
Alternatives and similar repositories for dex:
Users that are interested in dex are comparing it to the libraries listed below
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- Crash Royale Attack Kit☆40Updated 6 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆105Updated 4 months ago
- AKA "Internet Chemotherapy"☆64Updated 7 years ago
- Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong t…☆99Updated 5 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆15Updated 3 years ago
- The Zonefile Transfer Toolkit☆28Updated this week
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 3 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- The Swiss Army knife for backend engineers.☆96Updated 3 years ago
- Let's brute force this hotel's tv.☆75Updated 5 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 5 years ago
- kills all TCP connections on a network☆40Updated 8 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Create your own TOR hidden service, and keep it secure. A guide on how to create a virtual machine that runs a tor hidden service website…☆92Updated 8 years ago
- Entropy is a (prototype) WAF driven by maths.☆55Updated 5 years ago
- Offline radio signal analyser☆44Updated 4 years ago
- Proof-of-concept python IRC botnet for orchestrating macOS computers (harmless due to SIP & Gatekeeper)☆83Updated 3 years ago
- Magnetic stripe spoofer implementing audio waves.☆37Updated 8 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- [unofficial fork] RAR bruteforce cracker☆41Updated 6 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 5 years ago
- Hunt Open MongoDB instances☆78Updated 5 years ago
- Tools for 802.11 information gathering.☆118Updated 2 years ago
- Information about project #botjakten☆52Updated 6 years ago
- ☆39Updated 6 years ago
- WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.☆228Updated 4 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 8 years ago