actuator / DEFCON-33Links
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers
☆88Updated last month
Alternatives and similar repositories for DEFCON-33
Users that are interested in DEFCON-33 are comparing it to the libraries listed below
Sorting:
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 6 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Updated 3 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 7 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆30Updated 6 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆63Updated 2 months ago
- ☆65Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆71Updated last year
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆86Updated 3 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆43Updated 5 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 9 months ago
- Offensive Security & Red Teaming Labs and Projects☆25Updated 2 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆58Updated 3 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- ☆33Updated 4 months ago
- Darkweb_Crawler - an advanced version of DEEPWEBHARVESTER is a Python-based OSINT (Open-Source Intelligence) tool designed for ethical se…☆41Updated last month
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- CVE-2025-49144 PoC for security researchers to test and try.☆81Updated 3 months ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆39Updated 5 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆36Updated this week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Laravel RCE Exploitation Toolkit☆46Updated 3 weeks ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆107Updated last month
- GitHub CVE Repository Hunt☆19Updated last year
- ☆47Updated 4 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year