• Stars
    star
    2
  • Language
    Python
  • Created almost 10 years ago
  • Updated almost 10 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

script Python pour télécharger iTunes Connect rapports de vente quotidiens.

More Repositories

1

CTF-Tools

Useful CTF Tools
263
star
2

FTK-imager-OSX

FTK Imager a Forensics Tools For MAC OS X
52
star
3

elpscrk

Elliot Password's Cracker
Python
45
star
4

Email-Bomb

Send Email Bomber Anonymously Using Ur Account Yahoo Or Gmail
Python
33
star
5

crack-cpanel

Crack Contrôl Panel
PHP
24
star
6

against-cracker

against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.
Python
20
star
7

AIRBASE-NG-SSLSTRIP-AIRSTRIP-

While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch of scripts out there which do the job nicely, if you are ready to modify them here and there. In order for it to work, you need to run airmon-ng to start the card in monitor mode, run airbase-ng to run it in AP mode, run a DHCP server, set up routing, configure iptables for NAT and set up ip forwarding...that's all ;) Anyway, this works great, ... but great evil minds like to add layers of evilness upon evilness ;) So: why not add sslstrip to the mix and capture all those nice SSL pages which are redirected from normal HTTP? Not that hard: just add an extra iptables line to redirect HTTP traffic to SSLStrip and "Airstrip"is born. Note that this is just something that was cooked up in about an hour, so don't expect any robustness. Also: if it doesn't work out of the box: you are on your own. It works for me, with my particular setup but if you have any experience with BT/Linux, you should be able to make it work for you as well .
Shell
12
star
8

Air_sslstrip

Capturing Passwords With sslstrip From Network When You Are Connected
Shell
11
star
9

Hook-Analyser-V3.4

Hook Analyser is a Freeware Malware Analysis and Cyber Threat Intelligence Software
HTML
7
star
10

Hackloud

Brute Force Access To Apple Device
Python
6
star
11

StegoMagic

Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file.
5
star
12

Logcleaner

A Linux logcleaner.
Python
5
star
13

bypassing-google-2-factor

bypassing google 2 factor authentification using a simple script javascript
4
star
14

WPA-Crack

Crack Password WPA
Shell
4
star
15

WriteupsCTF

Writeups For Some CTF Challenges
3
star
16

Bluetooth-Tracker

script for tracking link quality and rssi (recieved signal strength) for specified remote bluetooth enabled device.
Python
3
star
17

dnsspider

A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.
Python
3
star
18

reversing

Due to the lack of documentation for Immnunity API this is an easy template for function hooking while reversing.
Python
3
star
19

yubikill

Shutsdown your computer whenever your yubikey gets disconnected.
C
3
star
20

Bash4Hacking

Shell
2
star
21

airodump

scan Network using monitor
Shell
2
star
22

WPA-PSK

Cracking Password Type WPA-PSK
Shell
2
star
23

wp-revslider

WordPress RevSlider File Upload and Execute Vulnerability
Ruby
2
star
24

inurlbr-scanner

Advanced search in the search engines, since Enables analysis to exploit GET / POST to capture emails & amp; internal custom validation for each target / url found.
PHP
2
star
25

Steganography

Python program to steganography files into images using the Least Significant Bit technics.
Python
2
star
26

Structured-query-Language-injection

SQL injection Automatic tools
Python
2
star
27

Double-MITM-Target

C++
2
star
28

MrMugiwara.github.io

Build Your Own Page/Blog/website On Github like mine
CSS
2
star
29

Metasploit-Encryption

This tool permit to evade any antivirus products. It use a brute force attack on a known plain text to bypass the sandbox.
Ruby
1
star
30

U2F-Key-PIV-TOOLS-MacOSX

YubiKey PIV Manager
C
1
star
31

Pompem-master

Python
1
star
32

extractor-data

This action extracts data from a target URL
Python
1
star
33

vps

1
star
34

ripdc-scanner

A lame script which maps domains related to an given ip address or domainname.
Shell
1
star
35

Angr

angr is a framework for analyzing binaries. It focuses on both static and dynamic symbolic ("concolic") analysis, making it applicable to a variety of tasks.
1
star
36

unzip

Script Unzip avec PHP
PHP
1
star
37

Find_Malware

find_injected_dll
Python
1
star
38

MITM-attack-tool

Python
1
star
39

email-extractor

Extract email address from given domain
Shell
1
star
40

Capture-Handshake

Script can help you to capture Handshake Of wireless You want Attacked
Python
1
star
41

Multi-SQLi

Multi SQL Injection
PHP
1
star
42

null-Byte

filter windows setting
C++
1
star
43

Honeypot

A honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information Systems.
Ruby
1
star
44

JPS

joomla python scanner
Python
1
star
45

Fake-Access-Point

Script can help you to creat a Fake Access Point
Shell
1
star
46

snitch

Python
1
star
47

pentest-mail

ham-sec is simple script which extract email address from given domain for penetration testing process.
Shell
1
star
48

shellcode-linux

Just because our fuzzer worked or the PoC was fantastic doesn't mean that running calc is gonna put a smile on your face. If you got RCE try our shellcodes to actually do something useful.
C
1
star
49

htaccess-Password-Generator

Limiting web access using passwords. Although you cannot password protect a single document, you can require a userid and password to access a directory. Thus any and all documents stored in that directory cannot be view without entering the proper userid and password. For example, you create a directory called "private" that you want to restrict access so that only a select few friends or customers could see the file(s) in it. This involves the creation of 3 different text files. Below are some examples of what they may look like.
1
star
50

scripts-upload

Multiple simple scripts which upload Files from Your Compuer To domain Directory.
PHP
1
star