BenBE / kompromat
Private keys that have become public ...
☆19Updated 2 years ago
Alternatives and similar repositories for kompromat:
Users that are interested in kompromat are comparing it to the libraries listed below
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆10Updated 2 months ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆12Updated 2 months ago
- OSDP attack tool (and the Elvish word for friend)☆98Updated last year
- Simulator forked from ICSim used during Car Hacking Workshops☆15Updated 7 months ago
- Proof of Concept for CVE-2023-22906☆7Updated last year
- Rubber Ducky powered by NeoKey☆22Updated 10 months ago
- The Multi-Protocol Swiss-Army-Knife for Hardware Hackers (UART/JTAG/SPI/I2C)☆76Updated 5 months ago
- BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]☆19Updated 2 years ago
- Windows Remote Administration Tool that uses Discord as C2☆28Updated 2 years ago
- Evil Crow Cable Pro device☆105Updated 3 months ago
- ☆39Updated 11 months ago
- Long Range Pager Systems pagers and coasters URH and YS1 (yardstick one / cc11xx) information and brute force tool☆49Updated 2 years ago
- FlipperZero - Mix of random flipper zero ducky scripts☆16Updated 5 months ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆71Updated 2 months ago
- Phone bluetooth suite that can track and prompt user notification☆17Updated 10 months ago
- Force target victim to unsafe network☆20Updated 2 weeks ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆72Updated last year
- Bluetooth Security Assessment Methodology☆125Updated 10 months ago
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosar…☆21Updated 3 years ago
- ☆13Updated 7 months ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆31Updated last month
- V2G evaluation tool☆18Updated 5 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 2 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Crack passwords with Hashcat using a Discord Bot.☆24Updated last year
- Legba recipes.☆48Updated 7 months ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated 11 months ago