Lyrebirds / sagemcom-fast-3890-exploit
☆222Updated 4 years ago
Related projects: ⓘ
- ☆289Updated 3 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 4 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 4 years ago
- A simple embedded Linux backdoor.☆193Updated 3 years ago
- Database of private SSL/SSH keys for embedded devices☆253Updated 7 months ago
- ☆333Updated this week
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆348Updated 2 years ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆571Updated 3 months ago
- ☆99Updated 2 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆254Updated 3 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆616Updated 4 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆154Updated 3 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆287Updated 4 years ago
- A collection of various scripts I've written through the years☆68Updated last year
- Linux enumeration and privilege escalation tool.☆274Updated 3 years ago
- Evil client portion of EAP relay attack☆186Updated last year
- ☆118Updated 5 years ago
- An Android app that lets you use your access control card cloning devices in the field.☆437Updated 5 years ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆159Updated 7 years ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆239Updated 2 years ago
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆96Updated last year
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated last year
- HAT (Hashcat Automation Tool) - An Automated Hashcat Tool for common wordlists and rules to speed up the process of cracking hashes duri…☆297Updated 3 months ago
- #CyberBarcode☆60Updated 9 months ago
- scripts and examples for using JTAG debug tools to gain root access☆170Updated 8 years ago
- ☆190Updated 3 years ago
- collection of verified Linux kernel exploits☆183Updated 3 years ago
- Script for orchestrating mana rogue WiFi Access Points.☆222Updated 3 weeks ago
- ☆286Updated this week
- ☆108Updated 2 years ago