JordanMilne / YMail-PineappleView external linksLinks
Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash
☆28Oct 17, 2016Updated 9 years ago
Alternatives and similar repositories for YMail-Pineapple
Users that are interested in YMail-Pineapple are comparing it to the libraries listed below
Sorting:
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Python requirements.txt parser☆14Feb 13, 2015Updated 11 years ago
- Programming problems☆15Jun 13, 2019Updated 6 years ago
- A Github organization reconnaissance tool.☆218May 22, 2023Updated 2 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- A webshell framework for penetration testers.☆300Aug 10, 2025Updated 6 months ago
- Utility to decompress Linux swsusp hibernation file.☆28Aug 11, 2021Updated 4 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- ☆12May 9, 2017Updated 8 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- SLE 4442 smartcard emulation on an AVR☆14Apr 20, 2020Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- Probe Zero project - see Ndh2K16☆13Jul 3, 2016Updated 9 years ago
- WiFi HID Injector for Fun & Profit☆18May 2, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- CardStalker provides a UART-driven smartcard reader at the T=1 (see ISO7816-3) level (link and physical layer), where most of the smartca…☆21May 1, 2022Updated 3 years ago
- OOK modulator for Arduino☆23May 14, 2016Updated 9 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Network Security Monitoring Framework☆48Oct 19, 2012Updated 13 years ago
- Your last stop for password list generation needs!☆27Mar 4, 2015Updated 10 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Oct 14, 2017Updated 8 years ago
- Android app for the RF430FRL152H and other NFC Type V tags.☆48Jun 25, 2020Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 9 years ago
- Repository for Tor's DNS-related issues.☆17Dec 19, 2016Updated 9 years ago
- Oasis is a lightweight modular framework allowing to easily write, build and patch instrumentation modules for Bluetooth Low Energy (BLE)…☆20Dec 5, 2023Updated 2 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago