Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash
☆28Oct 17, 2016Updated 9 years ago
Alternatives and similar repositories for YMail-Pineapple
Users that are interested in YMail-Pineapple are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python requirements.txt parser☆14Feb 13, 2015Updated 11 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- A Github organization reconnaissance tool.☆218May 22, 2023Updated 2 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Reverse engineer protobuf from javanano☆29Mar 21, 2017Updated 9 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Nov 13, 2018Updated 7 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆84Aug 6, 2014Updated 11 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- A webshell framework for penetration testers.☆301Aug 10, 2025Updated 7 months ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- An example of obtaining RCE via Redis and CSRF☆76Sep 11, 2016Updated 9 years ago
- ☆18Mar 8, 2015Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- Checklists☆16Sep 22, 2016Updated 9 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆135Nov 17, 2016Updated 9 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Repository for Tor's DNS-related issues.☆17Dec 19, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Bypassing User Account Control (UAC) using TpmInit.exe☆131Sep 26, 2016Updated 9 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Oct 14, 2017Updated 8 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆20Aug 27, 2021Updated 4 years ago
- Wifi Pineapple - Repository, Issue tracker, Wiki☆39Mar 18, 2012Updated 14 years ago
- SLE 4442 smartcard emulation on an AVR☆14Apr 20, 2020Updated 5 years ago
- GNURadio OOT module for decoding KeeLoq transmitters.☆10Jun 30, 2017Updated 8 years ago
- ☆13Jul 9, 2017Updated 8 years ago
- Network Security Monitoring Framework☆49Oct 19, 2012Updated 13 years ago
- ☆29May 4, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆49Jun 29, 2015Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Probe Zero project - see Ndh2K16☆13Jul 3, 2016Updated 9 years ago