AnwarMohamed / SigPloitLinks
☆18Updated 8 years ago
Alternatives and similar repositories for SigPloit
Users that are interested in SigPloit are comparing it to the libraries listed below
Sorting:
- Locating Roaming location of a number, and collecting msisdn and opeartor related infromation (IMSI, HLR GT, MSC GT)☆83Updated 6 years ago
- Learn the most common Threats in mobile technology, Learn how to build your own IMSI catcher, and more!☆20Updated 2 months ago
- How to make a simple IMSI Catcher (Credit: Keld Norman)☆36Updated 7 years ago
- This program shows you IMSI , TMSI, LAC, CI of cellphones around you. This program was made to understand how GSM network works. Understa…☆34Updated 3 years ago
- SS7 Attack Simulator based on RestComm's jss7☆98Updated 2 years ago
- The Nmap Scanner for Telco☆163Updated 6 years ago
- Docker Implementation for srsRANProject☆40Updated 3 years ago
- GSM hacking tools and scripts☆56Updated 5 years ago
- Packet injection for wifi; simplified.☆36Updated 2 years ago
- simple ss7 & imsi catcher & kraken☆22Updated 3 years ago
- ☆23Updated 4 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆18Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- Source code for the new SIM card flaw which lets hijack any phone just by sending SMS - Source Code + Demo Video☆125Updated 10 months ago
- Awesome-Cellular-Hacking☆68Updated 4 years ago
- ☆12Updated 10 years ago
- Some scripts and stuff for wardriving and wifi hacks .... works great on kali and ubuntu 32 bit ...Reaver likes 32 bit binaries.☆26Updated 4 years ago
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Updated 6 years ago
- GUI CalypsoBTS☆36Updated 2 years ago
- A program that does Deauthentication Attack on every nearby wireless device☆26Updated 6 years ago
- A Scanner for M3UA protocol to detect Sigtran supporting nodes☆62Updated 7 years ago
- ☆25Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- MDK3 tool by ASPj☆37Updated 7 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Updated 6 years ago
- A compilation repository of all my findings regarding intercepting, decoding, and decrypting GSM data using a HackRF.☆24Updated 9 years ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆72Updated 2 years ago
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )☆22Updated 3 months ago
- Radio Signals Recognition Manual☆26Updated 2 years ago
- Small tool to capture packets from Bluetooth devices.☆52Updated last year