Lyrebirds / cable-haunt-vulnerability-test
☆290Updated 3 years ago
Alternatives and similar repositories for cable-haunt-vulnerability-test:
Users that are interested in cable-haunt-vulnerability-test are comparing it to the libraries listed below
- ☆221Updated 5 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆150Updated 4 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆161Updated 2 years ago
- A medium interaction printer honeypot 🍯☆202Updated last year
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆101Updated 5 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated 5 months ago
- Scripts and more for the Wyze camera☆86Updated 5 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆598Updated 9 months ago
- My security blog: CTF writeups, pentesting experiments, network forensics, and a long chaotic list of tools. https://prune2000.github.io/☆36Updated 4 years ago
- A simple embedded Linux backdoor.☆197Updated 4 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆469Updated 2 years ago
- A collection of various scripts I've written through the years☆67Updated 2 years ago
- A ZigBee hacking toolkit by Bishop Fox☆275Updated 3 years ago
- A mostly-serverless distributed hash cracking platform☆804Updated 11 months ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆158Updated 3 years ago
- Vulnerability checker for Callstranger (CVE-2020-12695)☆403Updated 3 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆151Updated 4 years ago
- A script that automates generation of OpenSSL reverse shells☆300Updated 4 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆318Updated 2 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- Database of private SSL/SSH keys for embedded devices☆257Updated last year
- Harden your Chrome browser via enterprise policy.☆283Updated 2 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆408Updated 5 years ago
- Let's brute force this hotel's tv.☆77Updated 5 years ago
- Outputs a reduced keyspace of random or sequential hex digits.☆43Updated 8 years ago
- ☆143Updated 5 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Updated 3 years ago
- Infrared fingerprinting and collections (IRIS) and other IR collection techniques☆71Updated 8 years ago
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆176Updated 5 years ago