SPRITZ-Research-Group / Skype-Type
Don't Skype & Type! Keyboard acoustic eavesdropping tool.
☆318Updated 5 years ago
Alternatives and similar repositories for Skype-Type:
Users that are interested in Skype-Type are comparing it to the libraries listed below
- Stealing CSRF tokens with CSS injection (without iFrames)☆319Updated 7 years ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- ☆351Updated 3 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆151Updated 4 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,095Updated 5 years ago
- Various Tools and Docker Images☆279Updated 6 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆125Updated 5 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 8 years ago
- Local Privilege Escalation☆206Updated 7 years ago
- Files from my DEFCON CTF VM.☆270Updated 8 years ago
- ☆150Updated 7 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- A webshell framework for penetration testers.☆296Updated 10 months ago
- Various PoCs☆490Updated 5 years ago
- This repository contains some bettercap transparent proxy example modules.☆282Updated 6 years ago
- Seamlessly spy on SSH session like it is your tty☆350Updated 7 years ago
- Fancy Bear Source Code☆260Updated 8 years ago
- A demo of altering an opened tab after a timer☆124Updated 8 years ago
- Open source offensive security platform for red team, by red team.☆382Updated 7 years ago
- Linux Memory Cryptographic Keys Extractor☆234Updated last year
- A list of publicly known but unfixed security bugs☆237Updated 6 years ago
- Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!☆764Updated 4 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆537Updated 2 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆135Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Automated Linux evil maid attack☆424Updated 9 years ago
- Malicious USB☆170Updated last year
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- ☆119Updated 5 years ago