Lyrebirds / cable-haunt-vulnerability-testLinks
☆293Updated 4 years ago
Alternatives and similar repositories for cable-haunt-vulnerability-test
Users that are interested in cable-haunt-vulnerability-test are comparing it to the libraries listed below
Sorting:
- ☆222Updated 5 years ago
- TESLA PowerWall 2 Security Shenanigans☆463Updated last year
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- A tool for processing a lot of pcaps using tshark☆153Updated 2 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 2 months ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆402Updated 4 years ago
- This repository has been combined with mac-tracker project and no longer receives updates.☆573Updated 4 months ago
- Auto discover and exploit LAN raspberry pi's☆108Updated last year
- A collection of various scripts I've written through the years☆68Updated 2 years ago
- generate reverse shell from CLI for linux and Windows.☆248Updated 5 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Updated 3 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆100Updated 6 years ago
- Harden your Chrome browser via enterprise policy.☆293Updated 2 years ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆338Updated last year
- Database of private SSL/SSH keys for embedded devices☆267Updated last year
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated 2 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Plug-and-play bash script for sniffing 802.11 probes requests☆250Updated 7 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆615Updated 3 weeks ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆159Updated 4 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- AI-based, context-driven network device ranking☆302Updated last year
- TotalRecon installs all the recon tools you need☆465Updated 5 years ago
- A script that automates generation of OpenSSL reverse shells☆302Updated 5 years ago
- intercepting kali router☆444Updated 8 years ago
- Let's brute force this hotel's tv.☆82Updated 5 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆467Updated 6 years ago
- THE ESP8266 HONEYPOT☆318Updated 5 years ago
- My security blog: CTF writeups, pentesting experiments, network forensics, and a long chaotic list of tools. https://prune2000.github.io/☆37Updated 5 years ago
- A simple script for discovery and analysis of UPnP servers☆174Updated 2 years ago