Lyrebirds / cable-haunt-vulnerability-testLinks
☆293Updated 4 years ago
Alternatives and similar repositories for cable-haunt-vulnerability-test
Users that are interested in cable-haunt-vulnerability-test are comparing it to the libraries listed below
Sorting:
- ☆222Updated 5 years ago
- TESLA PowerWall 2 Security Shenanigans☆460Updated last year
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- A tool for processing a lot of pcaps using tshark☆154Updated last year
- A guide and tool for cracking ssh known_hosts files with hashcat☆335Updated last year
- Harden your Chrome browser via enterprise policy.☆293Updated 2 years ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆403Updated 4 years ago
- A script that automates generation of OpenSSL reverse shells☆302Updated 4 years ago
- My security blog: CTF writeups, pentesting experiments, network forensics, and a long chaotic list of tools. https://prune2000.github.io/☆36Updated 5 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆152Updated 5 years ago
- This repository has been combined with mac-tracker project and no longer receives updates.☆576Updated last month
- A collection of various scripts I've written through the years☆67Updated 2 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Updated 2 years ago
- Plug-and-play bash script for sniffing 802.11 probes requests☆251Updated 7 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆101Updated 6 years ago
- Auto discover and exploit LAN raspberry pi's☆108Updated last year
- generate reverse shell from CLI for linux and Windows.☆247Updated 4 years ago
- TotalRecon installs all the recon tools you need☆464Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 9 months ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆471Updated 2 years ago
- THE ESP8266 HONEYPOT☆319Updated 4 years ago
- ☠ Man-in-the-middle wireless access point inside a docker container 🐳☆450Updated 7 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTY☆400Updated 7 years ago
- A simple script for discovery and analysis of UPnP servers☆173Updated 2 years ago
- Source to www.draw.io☆99Updated 6 years ago
- Implements a simple nested grammar for expanding passwords☆160Updated 2 years ago
- CERT Tapioca for MITM network analysis☆183Updated last year
- DNS noise generator that looks at your network activity and blends in. Requires pi-hole.☆98Updated 6 years ago
- Scripts and more for the Wyze camera☆86Updated 5 years ago
- a collection of writeups and tools related to ~embedded device ~hacking☆143Updated 7 years ago