RedBalloonShenanigans / MonitorDarkly
Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.
☆904Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for MonitorDarkly
- ☆1,325Updated last year
- SSH man-in-the-middle tool☆1,625Updated 3 years ago
- Various PoCs☆489Updated 4 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,661Updated 5 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆318Updated 5 years ago
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆748Updated 6 years ago
- DEPRECATED, bettercap developement moved here: https://github.com/bettercap/bettercap☆2,501Updated 6 years ago
- *DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM☆1,086Updated 6 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆574Updated 7 years ago
- This is a POC to show it is possible to capture enough of a handshake with a user from a fake AP to crack a WPA2 network without knowing …☆570Updated 2 years ago
- FruityWiFi is a wireless network auditing tool. The application can be installed in any Debian based system (Jessie) adding the extra pac…☆2,193Updated 2 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆403Updated last year
- JackIt - Exploit Code for Mousejack☆811Updated 4 years ago
- wireless hacking - This is automated wireless hacking tool☆1,237Updated 2 years ago
- A python2 script for sweeping a network to find windows systems compromised with the DOUBLEPULSAR implant.☆1,022Updated 4 years ago
- A collection of cheatsheets for various infosec tools and topics.☆805Updated 3 years ago
- Dirty COW☆3,353Updated 5 years ago
- VirtualBox E1000 Guest-to-Host Escape☆1,404Updated 6 years ago
- Software to identify the different types of hashes -☆1,343Updated 2 years ago
- A command line tool to detect shared passwords☆402Updated 8 years ago
- Started as arbitrary System Management Mode code execution exploit for Lenovo ThinkPad model line, ended as exploit for industry-wide 0da…☆668Updated 2 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,097Updated 5 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,525Updated 4 years ago