Lyrebirds / cable-haunt-vulnerability-test
☆289Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for cable-haunt-vulnerability-test
- ☆222Updated 4 years ago
- A collection of various scripts I've written through the years☆68Updated last year
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆150Updated 4 years ago
- generate reverse shell from CLI for linux and Windows.☆245Updated 4 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆584Updated 5 months ago
- Auto discover and exploit LAN raspberry pi's☆105Updated 7 months ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆405Updated 3 years ago
- TotalRecon installs all the recon tools you need☆460Updated 4 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆151Updated 3 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆161Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆255Updated 3 years ago
- Database of private SSL/SSH keys for embedded devices☆255Updated 9 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆352Updated last month
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆102Updated 5 years ago
- A mostly-serverless distributed hash cracking platform☆795Updated 7 months ago
- MAC address age tracking☆577Updated this week
- A tool for processing a lot of pcaps using tshark☆155Updated last year
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- A medium interaction printer honeypot 🍯☆200Updated last year
- GTRS - Google Translator Reverse Shell☆616Updated last month
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆619Updated 4 years ago
- A fast and secure multi protocol honeypot.☆311Updated 2 years ago
- ☆121Updated 5 years ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆324Updated 10 months ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆397Updated 7 years ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆242Updated 2 years ago
- A collection of tools for generating models of physical keys for 3D printing☆173Updated 6 years ago
- AI-based, context-driven network device ranking☆294Updated 9 months ago