BadgeWiz / TR16Badge
☆13Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for TR16Badge
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- ☆15Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 8 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 7 years ago
- Format string exploit generation☆9Updated 9 years ago
- Phishing Toolkit☆19Updated 6 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆32Updated 8 months ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 6 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- Parallel APK analyzer☆51Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- stuff from my ToorCon 2015 talk☆15Updated 9 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆34Updated 9 years ago
- Ruby API client for the Censys internet-wide network-scan search engine☆9Updated last month
- Repository for proxenet plugins☆14Updated 8 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 8 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆10Updated 10 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago