actuator / DEFCON-33Links
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers
☆92Updated 2 months ago
Alternatives and similar repositories for DEFCON-33
Users that are interested in DEFCON-33 are comparing it to the libraries listed below
Sorting:
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 8 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆64Updated 4 months ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆74Updated last year
- ☆48Updated 5 months ago
- It’s an OSINT reconnaissance poc powered by Local LLMs (Ollama). You can feed it an email, domain, or IP, and it automatically performs m…☆62Updated 2 weeks ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆109Updated last year
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 11 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 8 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Updated 5 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆61Updated 4 months ago
- GitHub CVE Repository Hunt☆19Updated last year
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆46Updated 5 months ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆35Updated last month
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 9 months ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆40Updated 7 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆76Updated last year
- In-Memory Rootkit For Linux and BSD☆86Updated 3 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆32Updated 7 months ago
- ☆20Updated 8 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆65Updated 4 months ago
- ☆65Updated last year
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 2 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆63Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆125Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflows☆43Updated 7 months ago
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆98Updated last month