Skip to content
View rundtstykker's full-sized avatar
  • AWS
  • Remote
Block or Report

Block or report rundtstykker

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Popular repositories

  1. Keylogger Keylogger Public

    A classic key logger program that logs key strokes and uses SMTP to send logged results to specified email.

    Python 7 3

  2. Application-Web-vulnerabilities-scanner Application-Web-vulnerabilities-scanner Public

    A python 2.7 vulnerability scanner that can easily be customized to scan for specified vulnerabilities by replacing or adding strings to input fields.

    Python 7 2

  3. arp-spoof arp-spoof Public

    A python 2.7 program written to manipulate protocols on layer 2 of OSI model. It effectively places you as MITM in connection.

    Python 4

  4. MITM-injection-HTTP-layer-7-manipulation- MITM-injection-HTTP-layer-7-manipulation- Public

    MITM-injection is a small-sized Python program written to understand the HTTP protocol at the packet level. Use this program to see how to manipulate HTTP elements as MITM

    Python 3

  5. subdomain-crawler-application-security- subdomain-crawler-application-security- Public

    A simple & lightweight domain crawler that uses a pre-defined wordlist to discover subdomains on specified domain

    Python 2

  6. MITM-file-injection MITM-file-injection Public

    MITM-injection is a small-sized Python program written to manipulate layer 7 protocols by MITM. Use this program to see how to manipulate HTTP elements as MITM.

    Python 2