Lyrebirds / cable-haunt-vulnerability-testLinks
☆292Updated 4 years ago
Alternatives and similar repositories for cable-haunt-vulnerability-test
Users that are interested in cable-haunt-vulnerability-test are comparing it to the libraries listed below
Sorting:
- ☆221Updated 5 years ago
- generate reverse shell from CLI for linux and Windows.☆246Updated 4 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆151Updated 5 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆602Updated last year
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆473Updated 2 years ago
- TotalRecon installs all the recon tools you need☆464Updated 4 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆178Updated 5 years ago
- A script that automates generation of OpenSSL reverse shells☆301Updated 4 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆162Updated 2 years ago
- A tool for processing a lot of pcaps using tshark☆154Updated last year
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆411Updated 5 years ago
- DNS covert channel implant for Red Teams.☆733Updated 5 years ago
- My security blog: CTF writeups, pentesting experiments, network forensics, and a long chaotic list of tools. https://prune2000.github.io/☆36Updated 4 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 8 months ago
- GTRS - Google Translator Reverse Shell☆615Updated 8 months ago
- This repository has been combined with mac-tracker project and no longer receives updates.☆576Updated this week
- Vulnerability checker for Callstranger (CVE-2020-12695)☆403Updated 3 years ago
- Mallory - MiTM TCP and UDP Proxy☆318Updated 3 years ago
- Harden your Chrome browser via enterprise policy.☆290Updated 2 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated 2 years ago
- internet monitoring osint telegram bot for windows☆154Updated 2 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆625Updated 5 years ago
- A collection of various scripts I've written through the years☆67Updated 2 years ago
- AI-based, context-driven network device ranking☆296Updated last year
- ☆127Updated 6 years ago
- A simple tool to generate fake web browsing and mitigate tracking☆284Updated 7 months ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆681Updated 5 years ago
- Auto discover and exploit LAN raspberry pi's☆108Updated last year