Pr0x13 / CVE-2014-4377Links
☆13Updated 10 years ago
Alternatives and similar repositories for CVE-2014-4377
Users that are interested in CVE-2014-4377 are comparing it to the libraries listed below
Sorting:
- various exploits☆31Updated 13 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- ☆12Updated 10 years ago
- Proof of Concepts, Exploits☆28Updated 3 months ago
- ☆12Updated 9 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- Broadpwn bug (CVE-2017-9417)☆51Updated 7 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Updated 10 years ago
- ☆72Updated 10 years ago
- Decrypts local iOS backups and recreates file system, with a framework for automatically extracting useful information☆43Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- A python script for obfuscating wireless networks☆78Updated 8 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main …☆27Updated 7 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆23Updated 7 years ago
- Password cracking utility☆53Updated 4 years ago
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Updated 9 years ago
- ☆19Updated 10 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 8 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 8 years ago
- Wireless discovery and exploitation framework written in Python☆18Updated 14 years ago