wybiral / dex
IoT device indexer and search engine.
☆59Updated 5 years ago
Alternatives and similar repositories for dex:
Users that are interested in dex are comparing it to the libraries listed below
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆105Updated 7 months ago
- AKA "Internet Chemotherapy"☆64Updated 7 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 7 years ago
- Demonstrating that disabling ICC in docker does not block raw packets between containers.☆65Updated 7 years ago
- TorProxy is a tool which uses netfilter hooks in the linux kernel to route all network traffic through the Tor network☆165Updated 7 years ago
- The Zonefile Transfer Toolkit☆28Updated last month
- ☆25Updated 7 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆46Updated 8 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- Hunt Open MongoDB instances☆78Updated 5 years ago
- Decentralized opsec panic button operating over UDP broadcasts and HTTP. Provides automatic ejection of encrypted drives as a safe-measur…☆225Updated 3 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Updated 7 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- kills all TCP connections on a network☆40Updated 8 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆119Updated 2 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆14Updated 3 years ago
- A badass grabbing tool for getting PDF's of books.☆26Updated 6 years ago
- Web on top of any protocol☆114Updated 4 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- Just a copy-paste XSS test file☆22Updated 12 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆126Updated 4 years ago
- Easily create Tor hidden services with one command.☆56Updated 8 years ago
- A Linux shell script to improve your privacy online☆83Updated 9 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- Wristband research tools☆31Updated 8 years ago