CTU-IIG / 802.11p-wireless-regdb
Wireless regulatory database for CRDA
☆13Updated 10 years ago
Alternatives and similar repositories for 802.11p-wireless-regdb:
Users that are interested in 802.11p-wireless-regdb are comparing it to the libraries listed below
- Raw socket utilities for 802.11p transmission☆9Updated 9 years ago
- Wireless configuration tool☆17Updated 9 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Format string exploit generation☆10Updated 9 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆27Updated 12 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆19Updated 10 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Honeypot for router backdoor (TCP 32764)☆17Updated 10 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆12Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆31Updated 8 years ago
- A web app scanner☆26Updated 10 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- ☆13Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Collection of Nmap scripts☆10Updated 9 years ago