Lyrebirds / sagemcom-fast-3890-exploitLinks
☆221Updated 5 years ago
Alternatives and similar repositories for sagemcom-fast-3890-exploit
Users that are interested in sagemcom-fast-3890-exploit are comparing it to the libraries listed below
Sorting:
- ☆292Updated 4 years ago
- PoC exploit for the CVE-2019-15126 kr00k vulnerability☆217Updated 5 years ago
- Database of private SSL/SSH keys for embedded devices☆261Updated last year
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Proof of concepts of attacks against Wi-Fi implementations☆140Updated 6 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆357Updated 8 months ago
- A modified frequency regulatory domain configuration that doesn't limit you.☆172Updated 8 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- Umap2 is the second revision of NCC Group's python based USB host security assessment tool.☆264Updated 3 years ago
- ☆127Updated 6 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Mallory - MiTM TCP and UDP Proxy☆318Updated 3 years ago
- Proof-of-concept of the KRACK attack against Linux and Android☆154Updated 7 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- ☆196Updated 4 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Updated 4 years ago
- Car Backdoor Maker☆220Updated 6 years ago
- collection of verified Linux kernel exploits☆187Updated 4 years ago
- AM radio data exfiltration with CPU cache in assembly☆19Updated last year
- Script for orchestrating mana rogue WiFi Access Points.☆243Updated 4 months ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆293Updated 7 months ago
- SensePost's modified hostapd for wifi attacks.☆570Updated 10 months ago
- A collection of various scripts I've written through the years☆67Updated 2 years ago
- Verify whether your Thunderbolt-enabled Linux system is vulnerable to the Thunderspy attacks.☆151Updated 5 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆162Updated 2 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 8 months ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Formerly private repository for discussion, knowledge- and code-sharing around new Unifying vulns, as announced on Twitter☆158Updated 3 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆625Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆161Updated 5 years ago