ElberTavares / routers-exploitView external linksLinks
☆11Feb 28, 2020Updated 5 years ago
Alternatives and similar repositories for routers-exploit
Users that are interested in routers-exploit are comparing it to the libraries listed below
Sorting:
- WhatsAsena Developer Forked from @YusufUsta New Repository for WhatsAsena. Also First UserBot for WhatsApp.☆13Jun 5, 2022Updated 3 years ago
- Modified luadec version to decompile TP-Link Archer C7 LUA firmware.☆31Mar 3, 2020Updated 5 years ago
- Gallery Hack Form Our Team☆11Aug 10, 2023Updated 2 years ago
- Example Telegram bot☆10Oct 2, 2023Updated 2 years ago
- ☆10Jul 16, 2024Updated last year
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- OpenCV Python wrapper example for CUDA function☆11Jan 5, 2022Updated 4 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- it is a trojan at least, half of it is 💀 See Readme☆10Feb 26, 2021Updated 4 years ago
- ☆10Aug 26, 2016Updated 9 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- Installs and adjusts Pentest tools.☆10Oct 19, 2022Updated 3 years ago
- 딥러닝을 이용한 3쿠션 힌트 안드로이드앱(3-Cushion Hint with Deep Learning)☆13Jun 2, 2021Updated 4 years ago
- ☆20Feb 6, 2026Updated last week
- Several script and images used with the juice jacking kiosks☆12Jul 21, 2013Updated 12 years ago
- Simple Optical Character Recognition service.☆11Mar 6, 2023Updated 2 years ago
- Script to Send Multiple Messages from WhatsApp☆11May 18, 2019Updated 6 years ago
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- This powerful apk for gallery hack☆28Sep 25, 2023Updated 2 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- The real GPT-4 with image access (You probably don't have access)☆12Mar 17, 2023Updated 2 years ago
- A tool to BruteForce ssh. An upgraded version of Hydra. Multiple bruteforce options☆10Jul 9, 2022Updated 3 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- GILANG - TOOLKIT [ SIMPLE PENETRATION TESTING TOOLS]☆11May 27, 2021Updated 4 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- Scrape Amazon Product Details and Pricing using Python☆10Dec 19, 2019Updated 6 years ago
- Performing IoT with arduino without WiFi Module☆12Dec 17, 2017Updated 8 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- ☆42Apr 18, 2024Updated last year
- BeyondTrust Endpoint Privilege Management☆12Jun 11, 2025Updated 8 months ago
- ☆10Feb 23, 2017Updated 8 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- Uses Google to search for .apks hosted on websites and downloads them☆19Aug 2, 2014Updated 11 years ago
- ☆12Apr 28, 2021Updated 4 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- A python RCE exploit on QNAP-QTS☆14Sep 15, 2020Updated 5 years ago