Auto discover and exploit LAN raspberry pi's
☆109Apr 7, 2024Updated last year
Alternatives and similar repositories for rpi-hunter
Users that are interested in rpi-hunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆215Oct 7, 2019Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- unix SSH post-exploitation 1337 tool☆141Dec 16, 2018Updated 7 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- barq: The AWS Cloud Post Exploitation framework!☆388Nov 19, 2022Updated 3 years ago
- Python implementation of the SlowLoris DoS attack.☆23Mar 19, 2017Updated 9 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Python based script for Information Gathering.☆105Jan 13, 2026Updated 2 months ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- List of Awesome Offensive Tools written in GO☆205Feb 25, 2019Updated 7 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- Generate masscan configuration files for lat/long and Areas. Useful for scanning specific areas.☆20Jun 30, 2020Updated 5 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- Easy files and payloads delivery over DNS☆423Jan 3, 2026Updated 2 months ago
- Write a bot that plays SpaceX's ISS docking simulation.☆11May 30, 2020Updated 5 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- A simple tool to upload data to the RAM of linux systems running the U-Boot bootloader☆23Sep 24, 2020Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- The Cybers Shell☆11Sep 17, 2016Updated 9 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- ☆17Jan 28, 2020Updated 6 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Oct 25, 2018Updated 7 years ago
- Check if a IP is from tor or is a malicious proxy☆57Feb 9, 2021Updated 5 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,228Oct 1, 2022Updated 3 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 6 years ago
- Recreates images in MS Paint☆12Jan 3, 2020Updated 6 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- The new name is DeTT&CT☆24Jul 8, 2019Updated 6 years ago
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆46Jan 26, 2019Updated 7 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago