Skip to content
Block or report user

Report or block phreakocious

Hide content and notifications from this user.

Contact Support about this user’s behavior.

Report abuse

Given an existing docker container, prints the command line necessary to run a copy of it.

Python 229 36 Updated Feb 16, 2019

SSH Server for Docker containers ~ Because every container should be accessible

JavaScript 435 69 Updated Apr 11, 2018

A Smart Ethernet Switch for Earth

C++ 3,116 355 Updated Mar 22, 2019

A Swiss army knife for your daily Linux network plumbing.

C 704 184 Updated Mar 6, 2019

Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launched processes, and gives the analyst the option to either keep…

PowerShell 174 34 Updated Dec 27, 2018

This PS script will extract macro from Excel and Word files. Also checks the macro for suspecious code patterns Includes temporary DDE check for word documents

PowerShell 6 2 Updated Jan 15, 2018

Shadow is a unique discrete-event network simulator that runs real applications like Tor, and distributed systems of thousands of nodes on a single machine. Shadow combines the accuracy of emulatio…

C 629 140 Updated Mar 11, 2019

Typefaces for source code beautification

Python 4,869 369 Updated Apr 30, 2018

A curated list of tools for incident response

2,532 644 Updated Nov 27, 2018

T-Pot Universal Installer and ISO Creator

C 836 184 Updated Mar 21, 2019

A collection of static SSH keys (public and private) that have made their way into software and hardware products.

458 74 Updated Jan 25, 2019

OpenBSD Router Boilerplate

Shell 194 18 Updated Mar 24, 2019

Sublime Text package that includes a simple build system to allow direct execution of bash scripts.

8 1 Updated Sep 26, 2016

Simple random DNS, HTTP/S internet traffic noise generator

Python 812 86 Updated Feb 27, 2019

An Interactive Pcap Editor (based on Scapy)

Python 9 10 Updated Oct 25, 2018

Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)

Ruby 297 225 Updated Mar 16, 2019

Deauthentication attack with two ESP8266 modules

Arduino 51 14 Updated Jan 28, 2016

An easy experiment which uses the ESP8266 wifi module to look for near smartphones around you

C++ 215 55 Updated Jan 29, 2019

Extract urls from text

Go 412 45 Updated Mar 10, 2019

A cross-platform, GPU-accelerated terminal emulator

Rust 15,016 666 Updated Mar 25, 2019 mobile application

TypeScript 562 121 Updated Mar 25, 2019

"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.

960 165 Updated Mar 17, 2019

passive downloading

Python 13 2 Updated Mar 26, 2015

TCP/IP packet demultiplexer. Download from:

C++ 943 164 Updated Jan 20, 2019

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 6,622 2,040 Updated Mar 24, 2019

💬 Bulk delete messages and files on Slack

Python 947 116 Updated Nov 10, 2018

Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can output the full wordlist as well as rules compatible with Hashcat…

Python 491 75 Updated Nov 3, 2018

“Protocol Informatics” is a project to design for automatically network protocol reverse engineering based on frame or packet analysis. "PI" is short for “Protocol Informatics”, which introduces lo…

12 1 Updated Apr 7, 2018

SDR Rx/Tx software for Airspy, Airspy HF+, BladeRF, HackRF, LimeSDR, PlutoSDR, RTL-SDR, SDRplay RSP1 and FunCube

C 517 98 Updated Mar 25, 2019

The x86 processor fuzzer

Python 3,910 286 Updated Sep 1, 2018
You can’t perform that action at this time.