Lyrebirds / cable-haunt-vulnerability-testLinks
β293Updated 4 years ago
Alternatives and similar repositories for cable-haunt-vulnerability-test
Users that are interested in cable-haunt-vulnerability-test are comparing it to the libraries listed below
Sorting:
- β222Updated 5 years ago
- A medium interaction printer honeypot π―β202Updated 2 years ago
- A tool for processing a lot of pcaps using tsharkβ153Updated last year
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.β152Updated 5 years ago
- Scripts and more for the Wyze cameraβ87Updated 5 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitterβ158Updated 4 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTYβ401Updated 7 years ago
- This repository has been combined with mac-tracker project and no longer receives updates.β575Updated 2 months ago
- Auto discover and exploit LAN raspberry pi'sβ108Updated last year
- Vulnerability checker for Callstranger (CVE-2020-12695)β402Updated 4 years ago
- generate reverse shell from CLI for linux and Windows.β247Updated 4 years ago
- Harden your Chrome browser via enterprise policy.β294Updated 2 years ago
- A guide and tool for cracking ssh known_hosts files with hashcatβ336Updated last year
- Plug-and-play bash script for sniffing 802.11 probes requestsβ252Updated 7 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.ioβ163Updated 3 years ago
- Phantom Tap (PhanTap) - an βinvisibleβ network tap aimed at red teamsβ605Updated last year
- A script that automates generation of OpenSSL reverse shellsβ302Updated 4 years ago
- THE ESP8266 HONEYPOTβ320Updated 5 years ago
- Implements a simple nested grammar for expanding passwordsβ160Updated 2 years ago
- The wiki in this repo contains information on debugging ports and software running on early Amazon Echo devices.β276Updated 8 years ago
- CPAP jailbreak to allow it to be used as a temporary ventilatorβ284Updated 5 years ago
- My security blog: CTF writeups, pentesting experiments, network forensics, and a long chaotic list of tools. https://prune2000.github.io/β36Updated 5 years ago
- β Man-in-the-middle wireless access point inside a docker container π³β450Updated 7 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wiresharkβ100Updated 6 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ356Updated last week
- CERT Tapioca for MITM network analysisβ183Updated last year
- A collection of various scripts I've written through the yearsβ67Updated 2 years ago
- Keystroke injection vulnerabilities in wireless presentation clickersβ97Updated 5 years ago
- An Android app that lets you use your access control card cloning devices in the field.β464Updated 6 years ago
- 3D reproduction of TSA Master keysβ69Updated 3 years ago