OffensiveBits / iPadRestrictionsCodeBypassLinks
☆19Updated 10 years ago
Alternatives and similar repositories for iPadRestrictionsCodeBypass
Users that are interested in iPadRestrictionsCodeBypass are comparing it to the libraries listed below
Sorting:
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Updated 10 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆30Updated 11 years ago
- Password cracking utility☆53Updated 4 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- Network white noise collector☆19Updated 9 years ago
- "Whatsapp Discover" is a tool for getting phone numbers of devices using Whatsapp by real time sniffing from an interface (disabled in th…☆21Updated 11 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- You'll never take me alive.☆86Updated 11 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- Local privilege escalation scripts and tools☆17Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆13Updated 11 years ago
- Hacking environment installation scripts for OS X☆27Updated 3 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 8 years ago
- Attacking WPA/WPA encrypted access point without client.☆49Updated 11 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Updated 9 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- ☆17Updated 9 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Updated 11 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago