ReversingSwitch / BroadPWN
☆17Updated this week
Related projects: ⓘ
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 6 years ago
- This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main …☆27Updated 7 years ago
- Wi-Fi Backdoors☆34Updated 9 years ago
- ☆23Updated this week
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Updated 6 years ago
- Educational Python penetration testing framework☆10Updated 6 years ago
- ☆23Updated this week
- ☆29Updated this week
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- ☆52Updated 7 years ago
- ☆17Updated this week
- WPS scan and pwn tool☆67Updated 4 years ago
- ssh session type for metasploit☆97Updated last year
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 7 years ago
- ☆33Updated this week
- Wireless Reconnaissance And Intelligent Target Harvesting☆45Updated 8 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- ☆19Updated this week
- Some exploits for ZeroNights 0x03☆37Updated 9 years ago
- ☆34Updated this week
- ☆13Updated this week
- Tools for check NSA EGBL exploit against Fortinet Firewall☆31Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆38Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 7 years ago
- ☆23Updated this week
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 5 years ago
- ☆63Updated this week
- Metasploit Usage Wiki☆47Updated 9 years ago
- ☆84Updated this week