Fake AccessPoint Attack
☆31Jul 27, 2018Updated 7 years ago
Alternatives and similar repositories for deadlysignals
Users that are interested in deadlysignals are comparing it to the libraries listed below
Sorting:
- This tool is embeds an android application with a msfvenom payload by using a embed ruby script it's just make the embeding more easier a…☆11May 3, 2017Updated 8 years ago
- The Watcher version 5.0☆19Nov 10, 2017Updated 8 years ago
- This project contains source code of our Nexmon-based jammer app presented as a demo at WiSec 2017.☆18Nov 5, 2021Updated 4 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- A simple Android Remote Administration Tool written for https://0x00sec.org!☆36Jul 27, 2016Updated 9 years ago
- Script that easily creates, signs and AV bypass .apk metasploit reverse_tcp payload.☆19Jun 14, 2020Updated 5 years ago
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago
- my simple perl5 scripts☆10Oct 18, 2016Updated 9 years ago
- Metasploit RPC controller application☆11Aug 20, 2018Updated 7 years ago
- The simplest GPS tracking web-app!☆19Apr 8, 2011Updated 14 years ago
- Lost and Found: Stopping Bluetooth Finders from Leaking Private Information☆14Apr 22, 2022Updated 3 years ago
- create and work with /usr/local/bin/perl5.*☆20Jun 8, 2022Updated 3 years ago
- pathscanner☆14Jun 5, 2015Updated 10 years ago
- Simple backdoor for public places, that uses a file system for communication. Just for fun! 😈☆54Nov 27, 2019Updated 6 years ago
- Hijacker for Linux Phones☆17Jul 16, 2025Updated 7 months ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- ☆11May 10, 2017Updated 8 years ago
- Teach yourself to program with a vibrator☆12Apr 13, 2016Updated 9 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- Project for exploring PCA through a simple Java implementation.☆12May 28, 2013Updated 12 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆31May 5, 2017Updated 8 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- ☆16Dec 13, 2025Updated 2 months ago
- some scripts to get imsi with gsm☆16Aug 23, 2016Updated 9 years ago
- Learning Perl☆12Jul 2, 2012Updated 13 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Wifi-Jamming is a simple GUI tool, yet highly effective method of causing a DoS on a wireless implemented using python pyqt5.☆11Aug 2, 2021Updated 4 years ago
- RFID spoofing code from scanlime.org☆20Sep 12, 2012Updated 13 years ago
- Realtek RTL8812AU v5.13.6 (2021-06-29) Wireless Lan Driver for Linux☆21May 15, 2023Updated 2 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- perl mirror☆19Dec 23, 2008Updated 17 years ago