Auto discover and exploit LAN raspberry pi's
☆109Apr 7, 2024Updated last year
Alternatives and similar repositories for rpi-hunter
Users that are interested in rpi-hunter are comparing it to the libraries listed below
Sorting:
- "PRinter Exploitation Toolkit" LAN automation tool☆215Oct 7, 2019Updated 6 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- Python based script for Information Gathering.☆105Jan 13, 2026Updated last month
- unix SSH post-exploitation 1337 tool☆141Dec 16, 2018Updated 7 years ago
- Auditing & Hardening script for Kubernetes☆45Apr 12, 2018Updated 7 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- Radare 2 wiki☆94Apr 24, 2020Updated 5 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.☆727May 6, 2022Updated 3 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- Ios 11-11.1.2 Jailbreak And ios 10-10.3.3 jailbreak. ORIGINAL PROJECT: https://github.com/JosephShenton/C0F3☆13Feb 8, 2018Updated 8 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- barq: The AWS Cloud Post Exploitation framework!☆388Nov 19, 2022Updated 3 years ago
- Easy files and payloads delivery over DNS☆422Jan 3, 2026Updated 2 months ago
- ☆102Jul 18, 2019Updated 6 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- A command-line tool for interfacing msr devices.☆12Nov 25, 2020Updated 5 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 6 years ago
- ☆11Dec 18, 2018Updated 7 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Aug 18, 2019Updated 6 years ago