{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"wifipumpkin3","owner":"P0cL4bs","isFork":false,"description":"Powerful framework for rogue access point attack.","allTopics":["security","mitm","proxy-server","python3","wireless","spoofing","sniffing","deauthentication-attack","accesspoint","rogueap","wifipumpkin3"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":1791,"forksCount":274,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-09T11:32:57.788Z"}},{"type":"Public","name":"Nanobrok","owner":"P0cL4bs","isFork":false,"description":"Web Service write in Python for control and protect your android device remotely. ","allTopics":["android","security","control","remote"],"primaryLanguage":{"name":"CSS","color":"#563d7c"},"pullRequestCount":0,"issueCount":1,"starsCount":179,"forksCount":39,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-14T23:49:28.238Z"}},{"type":"Public archive","name":"kadimus","owner":"P0cL4bs","isFork":false,"description":"kadimus is a tool to check and exploit lfi vulnerability.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":7,"starsCount":510,"forksCount":137,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-08-17T12:01:23.597Z"}},{"type":"Public archive","name":"WiFi-Pumpkin-deprecated","owner":"P0cL4bs","isFork":false,"description":"DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3","allTopics":["python","mitm","hacking","wifi","wireless","access-point","man-in-the-middle","sniffing"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":39,"starsCount":3077,"forksCount":719,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-04-18T19:32:52.927Z"}},{"type":"Public","name":"Shellcodes","owner":"P0cL4bs","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":52,"forksCount":34,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-07-20T18:52:02.345Z"}},{"type":"Public","name":"hanzoInjection","owner":"P0cL4bs","isFork":false,"description":" injecting arbitrary codes in memory to bypass common antivirus solutions","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":2,"issueCount":1,"starsCount":158,"forksCount":61,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-07-20T16:03:03.528Z"}},{"type":"Public","name":"Thanos","owner":"P0cL4bs","isFork":false,"description":"Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but you also can use this for exploit vulnerabilities, find proxy servers, or simply check for open ports.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":42,"forksCount":23,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-07-02T16:57:53.851Z"}},{"type":"Public","name":"L1sd0rker","owner":"P0cL4bs","isFork":false,"description":"Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":16,"forksCount":12,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-02-06T14:51:10.480Z"}},{"type":"Public","name":"DenniScan","owner":"P0cL4bs","isFork":false,"description":"Scanner de vulnerabilidades Web.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":14,"forksCount":14,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-09-06T03:21:50.113Z"}},{"type":"Public","name":"SQLuck","owner":"P0cL4bs","isFork":false,"description":"Ferramenta utilizada para encontrar sites vulneráveis a SQL Injection.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":1,"starsCount":8,"forksCount":11,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-09-06T03:16:10.236Z"}},{"type":"Public","name":"ShellShock-CGI-Scan","owner":"P0cL4bs","isFork":false,"description":"A script, in C, to check if CGI scripts are vulnerable to CVE-2014-6271 (The Bash Bug).","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":7,"forksCount":13,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-06-26T23:34:33.611Z"}},{"type":"Public","name":"RunRun","owner":"P0cL4bs","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"PHP","color":"#4F5D95"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":8,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-06-26T23:18:41.208Z"}}],"repositoryCount":12,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"P0cL4bs repositories"}