An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.
☆39Sep 28, 2017Updated 8 years ago
Alternatives and similar repositories for rrm_exploit
Users that are interested in rrm_exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Jan 27, 2026Updated 2 months ago
- Remote shell/exfiltration using keyboard leds.☆26Jul 27, 2017Updated 8 years ago
- Kernel memory leak/local DOS on iOS 11.☆30Nov 19, 2017Updated 8 years ago
- TweetSploit - Is a twitter Marketing Suite allowing for a nice and simple interface, from which you can access and automate Twitter marke…☆21May 18, 2016Updated 9 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- Take full control of a OSX user or root account via command line.☆101May 18, 2018Updated 7 years ago
- Some scripts and exploits☆149Jul 9, 2018Updated 7 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- This script automates the process of unlocking Apple ID accounts by solving captcha challenges, verifying account details, and resetting …☆14Jan 24, 2026Updated 2 months ago
- A full-featured proof of concept implementation of an np1sec chat client, implemented as a pidgin plugin.☆20Jun 7, 2021Updated 4 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- Mobile Substrate tweak to intercept, handle and tamper Pokemon GO data on-the-fly, directly on the device.☆14Aug 22, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- CVE-2017-13089☆56Nov 15, 2017Updated 8 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- 《C++反汇编与逆向分析技术揭秘》学习笔记☆12Jun 10, 2018Updated 7 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 12 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- ☆16Apr 17, 2021Updated 4 years ago
- A Framework for Comparing Password Guessing Strategies☆129Jul 11, 2019Updated 6 years ago
- DIGI-NETRA 🕵️♂️ is a Python OSINT toolkit for digital investigations. Trace phone numbers 📞, usernames 👤, IPs 🌐, and emails ✉️ with …☆27Aug 27, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Live USB stick / ISO that plays the film «Hackers» on a continuous loop☆38Aug 14, 2017Updated 8 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- rfcat port for the 900MHz Explorer board☆27Dec 19, 2016Updated 9 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆202Nov 30, 2017Updated 8 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Weekly industry summary☆17Apr 27, 2018Updated 7 years ago
- A set of vulnerable PHP scripts used to test w3af's vulnerability detection features.☆28Apr 15, 2015Updated 10 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆41Sep 6, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Botnet malware designed to infect and control a set of raspberry PIs. For educational purposes only.☆14May 23, 2018Updated 7 years ago
- PoC to append and extract data at the end of an ELF file☆20Aug 20, 2017Updated 8 years ago
- ☆101Sep 25, 2013Updated 12 years ago
- Collection of metasploit modules☆69Mar 1, 2017Updated 9 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago