CTU-IIG / 802.11p-wireless-regdb
Wireless regulatory database for CRDA
☆13Updated 10 years ago
Alternatives and similar repositories for 802.11p-wireless-regdb:
Users that are interested in 802.11p-wireless-regdb are comparing it to the libraries listed below
- Raw socket utilities for 802.11p transmission☆9Updated 9 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆35Updated 11 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- Wireless configuration tool☆17Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 12 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 8 years ago
- Scapy tools and scripts☆18Updated 4 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Format string exploit generation☆10Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- ZigBee hacking tools and scripts☆12Updated 7 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- ☆13Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- ☆23Updated 11 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Python libraries for Windows system coding☆14Updated 4 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Various exploits☆10Updated 7 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Virtual host brute forcer☆22Updated 11 years ago