networked status aggregator sees all
☆14Apr 26, 2021Updated 4 years ago
Alternatives and similar repositories for nsa
Users that are interested in nsa are comparing it to the libraries listed below
Sorting:
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Nov 20, 2021Updated 4 years ago
- Password cracking rules and masks for hashcat that I generated from cracked passwords.☆561Jan 3, 2017Updated 9 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- NSA finest tool☆986Apr 17, 2017Updated 8 years ago
- A campaign for a modern copyright reform.☆10Dec 11, 2020Updated 5 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- Bot to anonymously send E2EE messages over Signal to a subscriber list.☆11Feb 10, 2026Updated 3 weeks ago
- ☆19Jun 9, 2016Updated 9 years ago
- Payout Module, a thin C layer around the SSP protocol☆10Nov 6, 2016Updated 9 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Automatically crop scans of multiple images at once.☆14Feb 23, 2019Updated 7 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Python script to send SMS using Huawei new[er] USB dongles via the HTTP interface☆11Jul 10, 2017Updated 8 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- SocksSharp provides support for Socks4/4a/5 proxy servers to HttpClient☆12Feb 3, 2021Updated 5 years ago
- ccm - A small python library that helps identify vulnerabilities inside of encrypted data☆11Aug 17, 2020Updated 5 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- ☆11Jan 5, 2022Updated 4 years ago
- WiFi hacking with aircrack-ng support scripts☆11Oct 4, 2017Updated 8 years ago
- cve-2025-24813验证脚本☆11Mar 14, 2025Updated 11 months ago
- Command line language server protocol client (LSPC)☆11Jul 31, 2018Updated 7 years ago
- Firefox extension.☆12Feb 22, 2025Updated last year
- A python driven yahoo username availability validation software developed by Tufayel with proxy support☆10Aug 5, 2023Updated 2 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- A custom firmware for the WizMote to make incompatible versions work with WLED☆11Nov 1, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 10 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Ios 11-11.1.2 Jailbreak And ios 10-10.3.3 jailbreak. ORIGINAL PROJECT: https://github.com/JosephShenton/C0F3☆13Feb 8, 2018Updated 8 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 6 years ago
- ☆12Dec 1, 2014Updated 11 years ago
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Nov 21, 2025Updated 3 months ago
- [Android] Samsung Knox Standard activation helper library for Android☆11Jun 14, 2019Updated 6 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago