Pr0x13 / CVE-2014-4377Links
☆14Updated 11 years ago
Alternatives and similar repositories for CVE-2014-4377
Users that are interested in CVE-2014-4377 are comparing it to the libraries listed below
Sorting:
- various exploits☆32Updated 13 years ago
- Proof of Concepts, Exploits☆28Updated 9 months ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- ☆12Updated 11 years ago
- MiTM tools and scripts☆19Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Updated 12 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 10 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Updated 11 years ago
- Format string exploit generation☆10Updated 10 years ago
- All tools you needed during penetration testing.☆18Updated 8 years ago
- ☆12Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- Password cracking utility☆54Updated 4 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- My metasploit modules☆11Updated 10 years ago
- OS X rootkit loader version #1☆18Updated 10 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Wireless discovery and exploitation framework written in Python☆18Updated 15 years ago
- Various pentest scripts☆14Updated 11 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 11 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆30Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 10 years ago