finds you similar websites
auto-suggest    top sites

May 2nd, 2024

14 Popular Sites Like http://www.wyae.de/softwa...

Our team has examined the web and found several invaluable wardialing and security sites like this one. So come and discover additional sites that match this one.

Displaying 1 to 10 of 500 alternatives to http://www.wyae.de/software/paw/. (Updated: May 2nd, 2024)     [about these results]
Advanced Options
? Sort by:
popularity similarity
? Must Include:
? Cannot Include:
? Look For


 
You're looking for other sites like :
  WYAE - PAW/PAWS Wardialer
It is designed to scan for ISDN (PAWS only) and "modern" analog modems (running ... Wardialing tools are - despite their martialic naming - used to find ...
http://www.wyae.de/software/paw/
popularity:
wardialing
security
tools
wardialer
python
pentest
tool
telephony
hacking
phone
new search by a custom tag signature
  WarVOX: Introduction
This model allows WarVOX to find and classify a wide range of interesting lines, ... just those connected to modems, allowing for a comprehensive audit of ...
similarity:
popularity:
security
wardialing
voip
hacking
tools
pentest
phone
infosec
opensource
linux
  Dirk Loss: Python tools for penetration testers
No information avaiable
similarity:
popularity:
python
security
tools
pentest
hacking
networking
programming
pentesting
research
toolkit
  Scapy
... to scapy.ml-subscribe(at)secdev.org. To send a mail to the mailing-list: scapy.ml(at)secdev.org ... Scapy reference repository is at http://hg.secdev.org/scapy ...
similarity:
popularity:
security
python
network
networking
tools
packet
tool
programming
software
hacking
  Penetration Test
... DBA_USERS WHERE US ERNAME='SYS')||'.vulnerabilityassessment.co.uk') FROM DUAL; ... DBA_USERS WHERE USERNAM E='SYS')||'.vulnerabilityassessment.co.uk') FROM DUAL ...
similarity:
popularity:
security
hacking
pentest
reference
penetration
tools
tutorial
howto
network
hack
  Top 100 Network Security Tools
Review of the top 100 network security tools (free or commercial), as voted on by 3,200 Nmap Security Scanner users ... I (Fyodor) asked users from the nmap ...
similarity:
popularity:
security
tools
network
software
hacking
linux
sysadmin
networking
windows
utilities
  Security Database IT Watching
Security-Database.com is a free web service solution that offer real-time vulnerabilities alerts and ... Security-Database offers a Cross Linked database hourly ...
similarity:
popularity:
security
tools
pentest
hacking
reference
software
resources
seguridad
exploits
news
  sqlninja - a SQL Server injection & takeover tool
However, there were some things that really needed to be added to this tool, so ... Upload mode is not limited to files of 64k bytes anymore. Uploading files is also ...
similarity:
popularity:
security
sql
tools
hacking
sqlinjection
pentest
injection
hack
database
tool
  VulnerabilityAssessment.co.uk
... Web Local. Welcome to VulnerabilityAssessment.co.uk - Hopefully a valuable information source for ... SecurityFocus. The Register © VulnerabilityAssessment.co.uk ...
similarity:
popularity:
security
pentest
vulnerability
hacking
reference
tools
penetration
network
testing
software
  BindShell.Net: Home
A bindshell is a remote shell connection, similar to the connection a telnet client preforms to a telnet server. Any operating system supporting a TCP stack and a ...
similarity:
popularity:
security
hacking
exploits
tools
hack
shell
pentest
tool
xss
web
  The Metasploit Project
The Metasploit Framework is the open source penetration testing framework with the world's largest database of public, tested exploits.
similarity:
popularity:
security
hacking
tools
exploit
software
network
opensource
hack
exploits
linux
1 2 3 4 5 ... 50 next >
Sorting Results
  • This slider determines how the matched sites are sorted.
  • If you want to see the most popular sites that are somewhat related to your search, slide this more towards "popularity."
  • If you want to see the sites that best matched your search, regardless of popularity, slide this towards "similarity."
Must Include Tags
  • Matched sites will not be shown unless they have all of the tags on this list.
  • This feature is useful for when you require a site to have been tagged as something.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Must Not Include Tags
  • Matched sites that have any tag on this list will not be shown.
  • This feature is useful for filtering out results that have tags you are absolutely not interested in.
  • To add a tag to this list, click "add tag" or click on any tag in a result.
Types of Results
  • This option lets you specify the types of sites to show.
  • If you want to only see domains (www..com), select "domains only."
  • If you want to only see articles (www..com/something/here), select "articles only."
  • If you don't care, or care so much about both, select "Both".
About The Results
an example search result
How moreofit Searches
Each website has a unique tag signature -- a set of words that users have described the website as. Moreofit searches for websites that have similar tag signatures and displays the results.
1: Similarity
A site's "similarity" is determined by how well its tag signature matches the tag signature that is being searched for. A 100% match means that it has the exact same tags in the exact same order, while a 0% match means it has no tags in common.
2: Popularity
The popularity of a website is, well, pretty much self explanatory.
3: Tag Signature
The tag signatures show how a site is described. The deeper the color of the tag, the more frequently the website is tagged as this. Tags underlined blue denote a tag that is in common with the search's tag signature.