SecurityInnovation / ofxposternLinks
Vulnerability scanner for OFX servers
☆32Updated last year
Alternatives and similar repositories for ofxpostern
Users that are interested in ofxpostern are comparing it to the libraries listed below
Sorting:
- A USB armory based USB sandbox☆21Updated 8 years ago
- USB armory Debian base image☆83Updated 2 weeks ago
- DNS zone transfer research☆59Updated 9 years ago
- Linux file read monitor☆91Updated 2 years ago
- "RansomPKP" proof of concept.☆11Updated 9 years ago
- Files compiled from the Logica breach investigation materials☆44Updated 7 years ago
- something i needed once☆20Updated 14 years ago
- ☆15Updated 3 years ago
- CLIP OS toolkit (cosmk)☆16Updated 4 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Updated 3 years ago
- Web of trust grapher☆38Updated 5 months ago
- Command line utility for parsing certificates☆66Updated 4 years ago
- ☆15Updated 5 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- ☆22Updated 7 years ago
- A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework☆42Updated 5 years ago
- A mirror of strobe☆12Updated 2 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- ☆30Updated 5 years ago
- Hacker OPSEC☆99Updated 7 years ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- ☆147Updated 9 years ago
- Mainframe bruter and screen automation utility.☆43Updated 11 years ago
- ☆58Updated 10 years ago
- A tool to discover bygonessl vulnerabilities using the facebook API☆20Updated 6 years ago
- CableTap public disclosure documents.☆78Updated 8 years ago
- Implementation of the ciphers in iClass☆44Updated 2 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago