An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.
☆39Sep 28, 2017Updated 8 years ago
Alternatives and similar repositories for rrm_exploit
Users that are interested in rrm_exploit are comparing it to the libraries listed below
Sorting:
- ☆11Jan 27, 2026Updated last month
- Remote shell/exfiltration using keyboard leds.☆26Jul 27, 2017Updated 8 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Take full control of a OSX user or root account via command line.☆101May 18, 2018Updated 7 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- rfcat port for the 900MHz Explorer board☆27Dec 19, 2016Updated 9 years ago
- Some scripts and exploits☆148Jul 9, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- Demo iPhone app for the HiJack device☆35Aug 21, 2011Updated 14 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- A Framework for Comparing Password Guessing Strategies☆129Jul 11, 2019Updated 6 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆83Jun 5, 2023Updated 2 years ago
- A bash script to automate the most basic usage of LUKS volumes in Linux VPS☆33Apr 5, 2017Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- 《C++反汇编与逆向分析技术揭秘》学习笔记☆12Jun 10, 2018Updated 7 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- CVE-2017-0199☆16Apr 19, 2017Updated 8 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- Filet-O-Firewall Vulnerability PoC☆61Sep 4, 2015Updated 10 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 12 years ago
- 一个简单的NIDS系统☆15May 17, 2017Updated 8 years ago
- dogecoin-mining botnet for windows☆15Mar 17, 2015Updated 10 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆205Sep 27, 2021Updated 4 years ago
- Burp Suite Attack Selector Plugin☆60Nov 23, 2017Updated 8 years ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- Mobile Substrate tweak to intercept, handle and tamper Pokemon GO data on-the-fly, directly on the device.☆14Aug 22, 2017Updated 8 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago