SpencerWoo / rrm_exploit
An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.
☆36Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for rrm_exploit
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 8 years ago
- ☆20Updated 8 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆36Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆31Updated 8 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 7 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 8 years ago
- Metasploit Usage Wiki☆48Updated 9 years ago
- Multi-threaded SSH Password Auditor☆92Updated 10 years ago
- Simple php backdoor based on extension☆22Updated 9 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆44Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 8 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago