Lyrebirds / cable-haunt-vulnerability-testLinks
β292Updated 4 years ago
Alternatives and similar repositories for cable-haunt-vulnerability-test
Users that are interested in cable-haunt-vulnerability-test are comparing it to the libraries listed below
Sorting:
- β221Updated 5 years ago
- A medium interaction printer honeypot π―β202Updated 2 years ago
- TESLA PowerWall 2 Security Shenanigansβ463Updated last year
- A tool for processing a lot of pcaps using tsharkβ153Updated 2 years ago
- Vulnerability checker for Callstranger (CVE-2020-12695)β402Updated 4 years ago
- Phantom Tap (PhanTap) - an βinvisibleβ network tap aimed at red teamsβ619Updated last month
- Auto discover and exploit LAN raspberry pi'sβ108Updated last year
- A script that automates generation of OpenSSL reverse shellsβ303Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testingβ360Updated 2 months ago
- This repository has been combined with mac-tracker project and no longer receives updates.β573Updated 5 months ago
- Harden your Chrome browser via enterprise policy.β294Updated 2 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.ioβ163Updated 3 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.β153Updated 5 years ago
- SSHPry v2 - Spy & Control os SSH Connected client's TTYβ403Updated 8 years ago
- TotalRecon installs all the recon tools you needβ465Updated 5 years ago
- My security blog: CTF writeups, pentesting experiments, network forensics, and a long chaotic list of tools. https://prune2000.github.io/β37Updated 5 years ago
- generate reverse shell from CLI for linux and Windows.β249Updated 5 years ago
- A guide and tool for cracking ssh known_hosts files with hashcatβ339Updated last year
- DNS noise generator that looks at your network activity and blends in. Requires pi-hole.β98Updated 6 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.β153Updated 4 years ago
- Hamburglar -- collect useful information from urls, directories, and filesβ319Updated 2 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitterβ160Updated 4 years ago
- DNS covert channel implant for Red Teams.β733Updated 5 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logsβ478Updated 3 years ago
- THE ESP8266 HONEYPOTβ318Updated 5 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wiresharkβ100Updated 6 years ago
- AI-based, context-driven network device rankingβ302Updated last year
- CPAP jailbreak to allow it to be used as a temporary ventilatorβ294Updated 5 years ago
- Wipe, reinstall or restore your system from running GNU/Linux distribution. Via SSH, without rebooting.β281Updated last year
- A collection of various scripts I've written through the yearsβ68Updated 2 years ago