Telefonica / SDK-SMS-Stack
SDK-SMS-Stack
☆29Updated 2 years ago
Alternatives and similar repositories for SDK-SMS-Stack:
Users that are interested in SDK-SMS-Stack are comparing it to the libraries listed below
- ☆37Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Framework for exploiting local vulnerabilities☆84Updated last year
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- The goal of this program is to quickly pull and install repos from its list☆40Updated 2 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Exploit the hack for IOS 11.1.2 and earlier to collect leaked information.☆84Updated 7 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆35Updated 7 years ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Simple Karma Attack☆69Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆71Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- My collection of nmap nse modules☆63Updated 5 years ago
- Centralized Firewall Control☆21Updated 7 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆34Updated 7 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Get clients and access points.☆49Updated 5 years ago
- Program to perform vulnerability analysis and automatically generate a report☆56Updated 2 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago