☆43Nov 8, 2017Updated 8 years ago
Alternatives and similar repositories for krackattacks-test
Users that are interested in krackattacks-test are comparing it to the libraries listed below
Sorting:
- A web viewer for WiSPY and Ubertooth spectrum data☆17Feb 13, 2014Updated 12 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆97Nov 21, 2017Updated 8 years ago
- 8811cu,8821cu chip linux driver☆10Jan 21, 2019Updated 7 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- T00ls.Net 2017第一期线下沙龙(北京)PPT合集☆20May 24, 2017Updated 8 years ago
- ☆15Mar 8, 2020Updated 6 years ago
- ☆11Jun 22, 2020Updated 5 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- Shellshock exploit aka CVE-2014-6271☆15Apr 1, 2022Updated 3 years ago
- St2-052☆55Sep 7, 2017Updated 8 years ago
- OsmoTRX - GSM base station transceiver☆22Apr 4, 2019Updated 6 years ago
- ☆76Feb 5, 2019Updated 7 years ago
- Jekyll repo for the blog about opensource SDR - HackRF.net☆10Feb 19, 2020Updated 6 years ago
- ☆161Jan 31, 2018Updated 8 years ago
- A CLI tool to help you easily delete forked repositories.☆10Feb 16, 2026Updated last month
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆202Nov 30, 2017Updated 8 years ago
- Stuff that I created during trying out GPRS sniffing☆16Jun 9, 2013Updated 12 years ago
- Code, commands, and chatter about Threat Hunting.☆35Jan 5, 2020Updated 6 years ago
- ☆17Oct 17, 2018Updated 7 years ago
- python audit tool 审计 注入 inject☆34Feb 25, 2016Updated 10 years ago
- Environment for DynoRoot (CVE-2018-1111)☆13May 17, 2018Updated 7 years ago
- 基于360提出的Ghost Tunnel攻击复现☆135Nov 15, 2024Updated last year
- Btlejack Firmware for nRF52-based devices (Micro:Bit v2, etc.)☆20Jun 9, 2022Updated 3 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- ☆34Nov 4, 2018Updated 7 years ago
- java版xss平台☆26Feb 25, 2019Updated 7 years ago
- LKM Rootkit based on Diamorphine☆15Oct 31, 2018Updated 7 years ago
- 生成各种形式混淆但有效的IP地址☆22Aug 12, 2018Updated 7 years ago
- Script en python para crear keylogger local y remoto.☆22Mar 5, 2026Updated 2 weeks ago
- cve-2018-2894 不同别人的利用方法。☆15Dec 1, 2025Updated 3 months ago
- Deemon is a tool to detect CSRF in web applications. Deemon has been used for the paper "Deemon: Detecting CSRF with Dynamic Analysis and…☆75Jun 6, 2018Updated 7 years ago
- libssh CVE-2018-10933☆22Oct 20, 2018Updated 7 years ago
- MitM proxy for modifying NFC APDUs on the fly, for use with NFCGate☆21Aug 6, 2015Updated 10 years ago
- ☆14Feb 23, 2026Updated 3 weeks ago
- CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882☆538Nov 29, 2017Updated 8 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- Arduino PBOC Library using MFRC522☆11Jul 27, 2017Updated 8 years ago
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year