DonnchaC / desktop-file-social-engineeringView external linksLinks
Desktop shortcuts (.desktop) create a risk for code execution via social engineering
☆10Feb 6, 2017Updated 9 years ago
Alternatives and similar repositories for desktop-file-social-engineering
Users that are interested in desktop-file-social-engineering are comparing it to the libraries listed below
Sorting:
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 5 years ago
- Cowrie Honeypot Obscurer☆17Oct 14, 2020Updated 5 years ago
- Exploits Oracle 9i XDB ftp password buffer overflow vulnerability☆11Jun 27, 2015Updated 10 years ago
- Mirror of https://github.com/iSECPartners/ios-ssl-kill-switch/☆16Dec 28, 2015Updated 10 years ago
- A development util for ehci debug and spi flashing. See http://www.coreboot.org/BBB_screwdriver☆19Mar 27, 2017Updated 8 years ago
- Scan for giveaways of fake Mobile Base Stations to detect them.☆21May 19, 2016Updated 9 years ago
- Twerp is the telephone hackers toolkit. It's also a command-line app for Twilio, written in Python☆27Nov 9, 2020Updated 5 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Feb 9, 2017Updated 9 years ago
- HP Power Manager 'formExportDataLogs' Buffer Overflow☆22Aug 13, 2017Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 11 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆52Sep 20, 2017Updated 8 years ago
- Qubes OS infrastructure configuration☆23Dec 22, 2025Updated last month
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- Introduction to electronic security for activists and dissidents☆21Mar 3, 2017Updated 8 years ago
- DHCP client disclosing less identifying information.☆61Aug 5, 2020Updated 5 years ago
- ADI Scripts for Linux images☆29Jul 16, 2025Updated 7 months ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- a wavelet-based multifractal image analysis tool implementing the WTMM (Wavelet Transform Modulus Maxima) method.☆11Feb 1, 2020Updated 6 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- shape recognition using opencv, webcam, python☆27Feb 27, 2016Updated 9 years ago
- RFC6455 compliant parser for websocket messages☆50Oct 13, 2017Updated 8 years ago
- Metasploit Framework☆26Updated this week
- MXET-300 Mobile Robotics Class utilizing the SCUTTLE Platform☆13Jun 16, 2025Updated 8 months ago
- sync a website or local spreadsheet with a google sheet☆35Jan 6, 2023Updated 3 years ago
- Gathers public information on companies to highlight social engineering risk.☆30May 25, 2016Updated 9 years ago
- A GPU-ready drop-in replacement for numpy.☆32Aug 25, 2022Updated 3 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- Poison, reset, spoof, redirect MITM script☆126Aug 5, 2023Updated 2 years ago
- Collection of data about URL filtering in various countries☆44Sep 21, 2016Updated 9 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆49Feb 20, 2017Updated 8 years ago
- TinyCore boards / attiny 1 series Core, Arduino IDE Core, targets ATtiny 417 / 814 / 816 / 817 / 1614 / 1616 / 1617 / 3217 and similar MC…☆39Feb 21, 2021Updated 4 years ago
- icinga2bot is a plugin for errbot that speaks to the Icinga2 API in order to relay messages to and from a chat channel.☆10Apr 13, 2020Updated 5 years ago
- TIM561 Python Library☆12Jun 11, 2021Updated 4 years ago
- A dummy TCP client and server application.☆11Nov 16, 2021Updated 4 years ago
- Scans WIFI access points using libnl☆11Sep 25, 2020Updated 5 years ago
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- This project contains simple methods to measure sample relatedness and identify potential swaps and contamination☆10Jan 8, 2016Updated 10 years ago