BenjaminBenetti / CGNM-2250-SHW-Root
How to root CGNM-2250-SHW (Shaw Hitron Router)
☆19Updated 6 years ago
Alternatives and similar repositories for CGNM-2250-SHW-Root:
Users that are interested in CGNM-2250-SHW-Root are comparing it to the libraries listed below
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 4 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 5 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Tor relay certificate downloader☆11Updated 8 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- Android application which allows sending SMS, with a specific SMSC without changing system defaults.☆13Updated 10 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 6 years ago
- (W|H)all of lame - unencrypted password gathering under open wifi networks☆32Updated 7 years ago
- Sniff every types of files you want on your network interface and save it.☆16Updated 9 years ago
- Proxmark 3 - HID Corporate 1000 bruteforce☆9Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- A collection of random 802.11 tools☆11Updated 11 months ago
- transparent TCP-to-proxy redirector☆16Updated 5 years ago
- Upload external IP so you can find your devices elsewhere☆15Updated 10 months ago
- ☆26Updated 4 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 5 years ago
- Just for some security tools I am making since HomeBrew doesn't like non-popular tools☆9Updated 4 years ago
- print() to Slack!☆12Updated 7 years ago
- ☆13Updated 7 years ago
- A really poor way of creating an RFID Jukebox to cast to Google Home☆14Updated 6 years ago
- Network white noise collector☆18Updated 8 years ago
- Spark MLib Training Models for Network Security☆16Updated 6 years ago
- Decrypts Cisco VPN Group Passwords☆17Updated 13 years ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- A tool to download all a user's twitter followers☆24Updated 9 years ago
- Backscatter and Crosstalk related Side Channel Attacks in modern Optical Networks.☆11Updated last year
- ESP8266 Compatible IR Blaster that accepts HTTP commands for use with services like Amazon Echo☆10Updated 7 years ago
- eVic electronic cigarette firmware decryption and image dumping☆14Updated 9 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Updated 8 years ago