SpencerWoo / rrm_exploitLinks
An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.
☆38Updated 8 years ago
Alternatives and similar repositories for rrm_exploit
Users that are interested in rrm_exploit are comparing it to the libraries listed below
Sorting:
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- ☆54Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆116Updated 9 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆49Updated 10 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆108Updated 9 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆177Updated 5 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- Black Nurse DOS attack☆72Updated 8 years ago
- ☆20Updated 9 years ago
- PLASMA PULSAR☆70Updated 8 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆47Updated 8 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆51Updated 8 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- ☆12Updated 11 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆168Updated 10 years ago
- Proof of Concepts, Exploits☆28Updated 7 months ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Updated 10 years ago
- MiTM tools and scripts☆19Updated 10 years ago