Lyrebirds / sagemcom-fast-3890-exploit
☆220Updated 5 years ago
Alternatives and similar repositories for sagemcom-fast-3890-exploit:
Users that are interested in sagemcom-fast-3890-exploit are comparing it to the libraries listed below
- ☆290Updated 3 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆166Updated 8 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- A simple embedded Linux backdoor.☆195Updated 4 years ago
- Database of private SSL/SSH keys for embedded devices☆255Updated 11 months ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 4 years ago
- ☆378Updated 12 years ago
- ☆140Updated 8 years ago
- Bypass captive portals by impersonating inactive users☆76Updated 10 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆595Updated 7 months ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆355Updated 3 months ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆161Updated 2 years ago
- NTP Main-in-the-Middle tool☆241Updated 2 years ago
- SensePost's modified hostapd for wifi attacks.☆558Updated 5 months ago
- Proof of concepts of attacks against Wi-Fi implementations☆139Updated 6 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated last year
- ☆123Updated 5 years ago
- Toolbox for HPE iLO4 & iLO5 analysis☆419Updated last year
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆256Updated 3 years ago
- This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit c…☆572Updated 5 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆256Updated 3 years ago
- ssh-client worm☆154Updated 4 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆620Updated 4 years ago
- collection of verified Linux kernel exploits☆186Updated 4 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆114Updated 5 years ago
- ☆228Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Tool for decrypting the firmware files for Samsung SSDs☆213Updated 3 years ago
- Material for a RE 101 class on Intel x64 binaries☆164Updated 5 years ago