Lists (9)
Sort Name ascending (A-Z)
Stars
Find, verify, and analyze leaked credentials
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Lightweight server monitoring hub with historical data, docker stats, and alerts.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Directory/File, DNS and VHost busting tool written in Go
Style definitions for nice terminal layouts π
Hard Drive S.M.A.R.T Monitoring, Historical Trends & Real World Failure Thresholds
Implements a deep pretty printer for Go data structures to aid in debugging
An OOB interaction gathering server and client library
Nvidia GPU exporter for prometheus using nvidia-smi binary
Go library for accessing and embedding Tor clients and servers
π¦ Wake up your devices with a single command or click. A Wake-On-LAN tool that works via CLI and web interface.
Asynchronous buffered pipes, utility net.Conns for testing and more