Just a place to dump the cdma data I collected while at Defcon 2016
☆50Nov 2, 2016Updated 9 years ago
Alternatives and similar repositories for Defcon2016GSMData
Users that are interested in Defcon2016GSMData are comparing it to the libraries listed below
Sorting:
- ☆33Oct 17, 2014Updated 11 years ago
- Running Key Cipher Decoder + other classic cipher decoders. Automatically discovers likely solutions using an NGram language model.☆39Jul 28, 2017Updated 8 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- Parse nmap's XML output files and insert them into an SQLite database☆29Jun 5, 2017Updated 8 years ago
- A Security and Privacy Guide for non-technical users☆45Oct 5, 2015Updated 10 years ago
- The NoSQL Honeypot Framework☆103Oct 17, 2023Updated 2 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- ☆18Feb 19, 2025Updated last year
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Nov 27, 2016Updated 9 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Feb 22, 2017Updated 9 years ago
- Mirror of http://rafale.org/~mattoufoutu/darkc0de.com☆13Jul 25, 2015Updated 10 years ago
- WebApp Honeypot for detecting Shell Shock exploit attempts☆55Jun 3, 2022Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Signal Tracking & Detection☆23Feb 14, 2026Updated 2 weeks ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- Tutorial for Node.js security☆21Sep 4, 2020Updated 5 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Sep 4, 2017Updated 8 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- AND!XOR DEFCON 24 Badge HW and SW☆44Jun 30, 2020Updated 5 years ago
- Suricata rules for Emerging Threats and funkyness☆75May 15, 2017Updated 8 years ago
- Blacklist ip addresses caught scanning or bruteforcing hosts☆20Jan 6, 2019Updated 7 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45May 22, 2017Updated 8 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- ☆49Mar 31, 2016Updated 9 years ago
- AutoBrowser Screenshot☆49Oct 27, 2016Updated 9 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- Enterprise WPA Wireless Tool Suite☆87Sep 13, 2022Updated 3 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago