Lyrebirds / cable-haunt-vulnerability-test
☆292Updated 3 years ago
Alternatives and similar repositories for cable-haunt-vulnerability-test
Users that are interested in cable-haunt-vulnerability-test are comparing it to the libraries listed below
Sorting:
- ☆221Updated 5 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆602Updated 11 months ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- GTRS - Google Translator Reverse Shell☆615Updated 7 months ago
- DNS covert channel implant for Red Teams.☆734Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 7 months ago
- A collection of various scripts I've written through the years☆67Updated 2 years ago
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆403Updated 3 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆101Updated 6 years ago
- generate reverse shell from CLI for linux and Windows.☆246Updated 4 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆150Updated 5 years ago
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 6 years ago
- Harden your Chrome browser via enterprise policy.☆285Updated 2 years ago
- CERT Tapioca for MITM network analysis☆183Updated last year
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆399Updated 7 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆158Updated 3 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆162Updated 2 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- ☆126Updated 6 years ago
- internet monitoring osint telegram bot for windows☆153Updated 2 years ago
- AI-based, context-driven network device ranking☆297Updated last year
- Database of private SSL/SSH keys for embedded devices☆258Updated last year
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 4 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 5 years ago
- TotalRecon installs all the recon tools you need☆464Updated 4 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆573Updated 5 years ago
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆304Updated 11 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆593Updated 4 years ago