ALW1EZ / spytruderLinks
π₯ Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool
β19Updated 2 months ago
Alternatives and similar repositories for spytruder
Users that are interested in spytruder are comparing it to the libraries listed below
Sorting:
- β28Updated 2 years ago
- Modular framework to exploit UPS devicesβ65Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).β52Updated last year
- Legba recipes.β50Updated last year
- masscan with exclusive excludesβ58Updated last year
- CVE-2013-4786 Go exploitation toolβ39Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.β40Updated 8 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.β36Updated last week
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.β42Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentialsβ54Updated 2 years ago
- Timestomp Tool to flatten MAC times with a specific timestampβ48Updated 5 months ago
- A wrapper around the Proxmark3 client that will alert the user of specific eventsβ30Updated 4 years ago
- A service container for interacting with SRA's VECTRβ12Updated 5 months ago
- Slides from my talk at the Adversary Village, Defcon 30β29Updated 2 years ago
- MAC Address brute forcing tool, used to bypass MAC based filteringβ16Updated 3 years ago
- One line command and control backdoors for APIs and web applications.β51Updated last year
- Slides and videos from talks given at consβ25Updated 3 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented dataβ¦β30Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.β40Updated last year
- Zeroday Microsoft Exchange Server checker (Virtual Patching checker)β70Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, β¦β19Updated 3 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whiβ¦β42Updated last year
- MacroExploit use in excel sheetβ20Updated 2 years ago
- Configurable, Community driven, HTTP C2 Profileβ26Updated 4 months ago
- PAM Backdoorβ30Updated 2 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.β38Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.β27Updated 6 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.β27Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domainβ40Updated last year
- Cisco CallManager User Enumerationβ15Updated 3 years ago