wybiral / dex
IoT device indexer and search engine.
☆59Updated 5 years ago
Alternatives and similar repositories for dex:
Users that are interested in dex are comparing it to the libraries listed below
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- AKA "Internet Chemotherapy"☆64Updated 7 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Let's brute force this hotel's tv.☆76Updated 5 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆15Updated 3 years ago
- ☆25Updated 7 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆105Updated 5 months ago
- Hunt Open MongoDB instances☆78Updated 5 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆931Updated 9 years ago
- Wristband research tools☆31Updated 8 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 5 years ago
- Magnetic stripe spoofer implementing audio waves.☆37Updated 8 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 4 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- The Zonefile Transfer Toolkit☆28Updated last month
- A specialized database server for linear algebra and machine learning.☆86Updated last year
- The Swiss Army knife for backend engineers.☆96Updated 3 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Discover SPOF in DNS dependency graphs☆67Updated 6 years ago
- Security tool to trace URL's jumps across the rel links to obtain the last URL☆53Updated 2 years ago
- Twitter as an extra entropy source☆100Updated 6 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- Crash Royale Attack Kit☆40Updated 6 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆110Updated 5 years ago