HarbinRepairs / The-Ear-ToolLinks
Audible Electromagnetic Interference Detector - Model ET-1
☆14Updated 5 years ago
Alternatives and similar repositories for The-Ear-Tool
Users that are interested in The-Ear-Tool are comparing it to the libraries listed below
Sorting:
- A monitoring program with sentiment analysis and prioritization.☆13Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Network white noise collector☆19Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- 🧠✈️ An ergo based project that relies on a convolutional neural network to detect airplanes from satellite imagery.☆44Updated 6 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Learning about disassembling☆20Updated 6 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- lulz: automated webstalking tool☆52Updated 9 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆57Updated 7 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 7 years ago
- ESPot - ElasticSearch Honeypot☆27Updated 11 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Updated 6 years ago
- My public exploit collection.☆31Updated 7 years ago
- ARP Man-in-the-Middle tool☆30Updated 10 months ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 11 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 8 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Updated 8 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Scrapes the web for reliable http or https proxies and prints them to stdout. Can also be used as a python library to easily generate rel…☆34Updated 6 years ago
- Let's brute force this hotel's tv.☆82Updated 5 years ago
- A shellcode testing harness.☆70Updated last year
- ssh session type for metasploit☆100Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago