CTU-IIG / 802.11p-wireless-regdb
Wireless regulatory database for CRDA
☆13Updated 10 years ago
Alternatives and similar repositories for 802.11p-wireless-regdb:
Users that are interested in 802.11p-wireless-regdb are comparing it to the libraries listed below
- Raw socket utilities for 802.11p transmission☆9Updated 9 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 10 years ago
- ZigBee hacking tools and scripts☆12Updated 6 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Wireless configuration tool☆17Updated 10 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 12 years ago
- Meteor package for client + server side IMSI-catcher detection.☆19Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Format string exploit generation☆10Updated 9 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆27Updated 8 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Leveraging CVE-2018-19788 without root shells☆18Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 11 months ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- A web app scanner☆26Updated 11 years ago
- Hackmelock Android application☆17Updated 7 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 8 years ago
- Wireless Miniaturized Device☆19Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- ☆13Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- ☆23Updated 11 years ago
- MS17-010☆12Updated 7 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago