CTU-IIG / 802.11p-wireless-regdbLinks
Wireless regulatory database for CRDA
☆13Updated 11 years ago
Alternatives and similar repositories for 802.11p-wireless-regdb
Users that are interested in 802.11p-wireless-regdb are comparing it to the libraries listed below
Sorting:
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
 - For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 11 years ago
 - Open-source Exploiting Framework☆30Updated 8 years ago
 - Get clients and access points.☆49Updated 6 years ago
 - A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
 - Some code snapshot that can be used to craft your own tool/exploit☆12Updated 10 years ago
 - hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
 - buffer overflow examples☆22Updated 7 years ago
 - hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆21Updated 3 years ago
 - ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
 - Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
 - ☆20Updated 12 years ago
 - Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆106Updated 11 years ago
 - Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
 - Small Linux command-line tool to "ping" 802.11 devices☆28Updated 13 years ago
 - Wireless Miniaturized Device☆19Updated 7 years ago
 - All your layer are belong to us☆20Updated 11 years ago
 - DPE - Default Password Enumeration☆36Updated 12 years ago
 - A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
 - Scapy tools and scripts☆20Updated 5 years ago
 - Software exploitation training material☆16Updated 8 years ago
 - Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
 - Various exploits☆10Updated 8 years ago
 - This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 12 years ago
 - Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
 - Automation Hacking & Penetration Testing Suite☆11Updated 9 years ago
 - ☆11Updated 11 years ago
 - Escalation Servers and Scripts for Priv Escalation☆19Updated 6 years ago
 - A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 10 years ago
 - SWF Vulnerability & Information Scanner☆19Updated 6 years ago