Auto discover and exploit LAN raspberry pi's
☆109Apr 7, 2024Updated 2 years ago
Alternatives and similar repositories for rpi-hunter
Users that are interested in rpi-hunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆31Oct 26, 2019Updated 6 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆217Oct 7, 2019Updated 6 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- unix SSH post-exploitation 1337 tool☆142Dec 16, 2018Updated 7 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Baseline Security Configuration For MacOS☆67Aug 28, 2018Updated 7 years ago
- Auditing & Hardening script for Kubernetes☆45Apr 12, 2018Updated 8 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 9 years ago
- barq: The AWS Cloud Post Exploitation framework!☆388Nov 19, 2022Updated 3 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98May 12, 2018Updated 8 years ago
- Python based script for Information Gathering.☆105Jan 13, 2026Updated 4 months ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- List of Awesome Offensive Tools written in GO☆205Feb 25, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- Generate masscan configuration files for lat/long and Areas. Useful for scanning specific areas.☆21Jun 30, 2020Updated 5 years ago
- Easy files and payloads delivery over DNS☆425Jan 3, 2026Updated 4 months ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- A simple tool to upload data to the RAM of linux systems running the U-Boot bootloader☆23Sep 24, 2020Updated 5 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- Digital Preservation Software (National Archives of Australia)☆38Jul 7, 2011Updated 14 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆68Dec 17, 2021Updated 4 years ago
- SkillTree☆27May 12, 2026Updated last week
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Apr 1, 2026Updated last month
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Oct 25, 2018Updated 7 years ago
- Check if a IP is from tor or is a malicious proxy☆58Feb 9, 2021Updated 5 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,229Oct 1, 2022Updated 3 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆46Jan 26, 2019Updated 7 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆64Nov 6, 2018Updated 7 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆20Mar 29, 2020Updated 6 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Apr 15, 2017Updated 9 years ago