All Projects → Respounder → Similar Projects or Alternatives

99 Open source projects that are alternatives of or similar to Respounder

Violent Python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 603 (+148.15%)
Mutual labels:  network-security
Captfencoder
CaptfEncoder是一款跨平台网络安全工具套件,提供网络安全相关编码转换、古典密码、密码学、特殊编码等工具,并聚合各类在线工具。
Stars: ✭ 473 (+94.65%)
Mutual labels:  network-security
Blackworm
Black Worm Offical Repo
Stars: ✭ 80 (-67.08%)
Mutual labels:  hackers
Anubis
🔓Subdomain enumeration and information gathering tool
Stars: ✭ 722 (+197.12%)
Mutual labels:  network-security
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+1341.56%)
Mutual labels:  network-security
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+4200.82%)
Mutual labels:  hackers
Pythoncode Tutorials
The Python Code Tutorials
Stars: ✭ 544 (+123.87%)
Mutual labels:  network-security
Redteam Hardware Toolkit
🔺 Red Team Hardware Toolkit 🔺
Stars: ✭ 163 (-32.92%)
Mutual labels:  hackers
Badkarma
network reconnaissance toolkit
Stars: ✭ 353 (+45.27%)
Mutual labels:  network-security
Blackhat Python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+362.96%)
Mutual labels:  network-security
Scapy
Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
Stars: ✭ 6,932 (+2752.67%)
Mutual labels:  network-security
pycommunityid
A Python implementation of the Community ID flow hashing standard
Stars: ✭ 18 (-92.59%)
Mutual labels:  network-security
Tunnel
Use Ngrok In Termux With Advanced Options
Stars: ✭ 133 (-45.27%)
Mutual labels:  hackers
Jackhammer
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (+160.49%)
Mutual labels:  network-security
Zazu
🚀 A fully extensible and open source launcher for hackers, creators and dabblers.
Stars: ✭ 2,060 (+747.74%)
Mutual labels:  hackers
Amass
In-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+2486.01%)
Mutual labels:  network-security
Snap
Bash Script For Backing Up All Files In Termux With Easy step
Stars: ✭ 90 (-62.96%)
Mutual labels:  hackers
Yasuo
A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network
Stars: ✭ 517 (+112.76%)
Mutual labels:  network-security
Mercury
Mercury: network metadata capture and analysis
Stars: ✭ 203 (-16.46%)
Mutual labels:  network-security
Appinfoscanner
一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Stars: ✭ 424 (+74.49%)
Mutual labels:  network-security
Findsploit
Find exploits in local and online databases instantly
Stars: ✭ 1,160 (+377.37%)
Mutual labels:  hackers
Qnsm
QNSM is network security monitoring framework based on DPDK.
Stars: ✭ 334 (+37.45%)
Mutual labels:  network-security
Zxrequestblock
基于NSURLProtocol一句话实现iOS应用底层所有网络请求拦截(含网页ajax请求拦截【不支持WKWebView】)、一句话实现防抓包(使Thor,Charles,Burp等代理抓包方式全部失效,且即使开启了代理,也不影响App内部的正常请求)。包含http-dns解决方法,有效防止DNS劫持。用于分析http,https请求等
Stars: ✭ 160 (-34.16%)
Mutual labels:  network-security
Fpnd
Python package for freepn network daemon
Stars: ✭ 271 (+11.52%)
Mutual labels:  network-security
Awesome Hacktivism
A curated list about Hacktivism.
Stars: ✭ 43 (-82.3%)
Mutual labels:  hackers
Resources For Beginner Bug Bounty Hunters
A list of resources for those interested in getting started in bug bounties
Stars: ✭ 7,185 (+2856.79%)
Mutual labels:  hackers
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-84.36%)
Mutual labels:  network-security
Netsec Ps Scripts
Collection of PowerShell network security scripts for system administrators.
Stars: ✭ 139 (-42.8%)
Mutual labels:  network-security
Bypass Firewalls By Dns History
Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Stars: ✭ 739 (+204.12%)
Mutual labels:  network-security
Ivre
Network recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+859.26%)
Mutual labels:  network-security
Diodb
Open-source vulnerability disclosure and bug bounty program database.
Stars: ✭ 654 (+169.14%)
Mutual labels:  hackers
Osint San
Framework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.​
Stars: ✭ 99 (-59.26%)
Mutual labels:  hackers
Nfstream
NFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+155.97%)
Mutual labels:  network-security
Onesixtyone
Fast SNMP Scanner
Stars: ✭ 218 (-10.29%)
Mutual labels:  network-security
Batfish
Batfish is a network configuration analysis tool that can find bugs and guarantee the correctness of (planned or current) network configurations. It enables network engineers to rapidly and safely evolve their network, without fear of outages or security breaches.
Stars: ✭ 592 (+143.62%)
Mutual labels:  network-security
Gohacktools
Hacker tools on Go (Golang)
Stars: ✭ 1,303 (+436.21%)
Mutual labels:  hackers
Easy hack
Hack the World using Termux
Stars: ✭ 549 (+125.93%)
Mutual labels:  hackers
Awesome Computer History
An Awesome List of computer history videos, documentaries and related folklore
Stars: ✭ 2,149 (+784.36%)
Mutual labels:  hackers
Thc Hydra
hydra
Stars: ✭ 5,645 (+2223.05%)
Mutual labels:  network-security
Night Shift On Unsupported Macs
Enable Night Shift on older Unsupported Macs
Stars: ✭ 86 (-64.61%)
Mutual labels:  hackers
Hackers
Hackers is an elegant iOS app for reading Hacker News written in Swift.
Stars: ✭ 513 (+111.11%)
Mutual labels:  hackers
Rubyfu
Rubyfu, where Ruby goes evil!
Stars: ✭ 228 (-6.17%)
Mutual labels:  network-security
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+75.72%)
Mutual labels:  network-security
2016lykagguvenligivesizmatestleri
Network Security Notes ☔️
Stars: ✭ 75 (-69.14%)
Mutual labels:  network-security
Archstrike
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (+65.02%)
Mutual labels:  hackers
3proxy
3proxy - tiny free proxy server
Stars: ✭ 2,263 (+831.28%)
Mutual labels:  network-security
Watchdog
Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+41.98%)
Mutual labels:  network-security
Train Ai With Django Swagger Jwt
Train AI (Keras + Tensorflow) to defend apps with Django REST Framework + Celery + Swagger + JWT - deploys to Kubernetes and OpenShift Container Platform
Stars: ✭ 66 (-72.84%)
Mutual labels:  network-security
Network Intrusion Detection
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15
Stars: ✭ 303 (+24.69%)
Mutual labels:  network-security
Changelog.com
Changelog is news and podcast for developers. This is our open source platform.
Stars: ✭ 2,354 (+868.72%)
Mutual labels:  hackers
Cyberscan
CyberScan: Network's Forensics ToolKit
Stars: ✭ 280 (+15.23%)
Mutual labels:  network-security
Project Tauro
A Router WiFi key recovery/cracking tool with a twist.
Stars: ✭ 52 (-78.6%)
Mutual labels:  network-security
Hack-Utils
Script to facilitate different functions and checks
Stars: ✭ 27 (-88.89%)
Mutual labels:  network-security
Netpwn
Tool made to automate tasks of pentesting.
Stars: ✭ 152 (-37.45%)
Mutual labels:  network-security
Hacker Anthology
Stock photo assets of real hackers
Stars: ✭ 12 (-95.06%)
Mutual labels:  hackers
Pskracker
An all-in-one WPA/WPS toolkit
Stars: ✭ 232 (-4.53%)
Mutual labels:  network-security
Zbang
zBang is a risk assessment tool that detects potential privileged account threats
Stars: ✭ 224 (-7.82%)
Mutual labels:  network-security
Hackercouch
Hospitality for Hackers
Stars: ✭ 185 (-23.87%)
Mutual labels:  hackers
M Wiz
Install Metasploit And Repair Metasploit In Termux With Easy Steps
Stars: ✭ 148 (-39.09%)
Mutual labels:  hackers
Awesome Ethical Hacking Resources
🔗 All the resources I could find for learning Ethical Hacking and Penetration Testing.
Stars: ✭ 933 (+283.95%)
Mutual labels:  hackers
1-60 of 99 similar projects