This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to attack strings, and crash the scanner.
☆24Oct 11, 2015Updated 10 years ago
Alternatives and similar repositories for jammer
Users that are interested in jammer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python automated wifi jammer☆40Mar 24, 2016Updated 10 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- A simple python script which can check HTTP status of branch of URLs/Subdomains and grab URLs/Subdomain title☆12Oct 16, 2019Updated 6 years ago
- Scripts that aren't PowerShell☆48Jan 13, 2020Updated 6 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Style for Termux and Kali tools. ( py )☆15Nov 29, 2021Updated 4 years ago
- Wireless Attacks in Python (Based on Blog Series)☆92Nov 16, 2013Updated 12 years ago
- This is a libary to mimic the functionallity of the linux shred command.☆15Dec 11, 2020Updated 5 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 11 years ago
- ☆15Dec 4, 2022Updated 3 years ago
- ECE 209 Security of Embedded Systems Project☆16Mar 17, 2018Updated 8 years ago
- TikSub adalah alat berbasis Python yang memanfaatkan platform Traodoisub untuk menukar koin menjadi followers, likes, dan views TikTok. C…☆16Aug 9, 2025Updated 7 months ago
- Proof Of Concept of a SRIX4K emulator☆20Mar 11, 2022Updated 4 years ago
- This repository contains some modified gap.c file options of the Flipper's BLE function, which can be used to simulate ADV Packet Spoofin…☆16Sep 9, 2023Updated 2 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- A plugin for Burp Suite Pro to work with attacker payloads and automatically generate check digits for credit card numbers and similar nu…☆11Jun 3, 2015Updated 10 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Nov 21, 2018Updated 7 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- Remote Keyless Entry Systems☆18Mar 26, 2017Updated 8 years ago
- Magspoof implementation via ESP8266 (ledunia)☆21Jul 27, 2018Updated 7 years ago
- app with bus-pirate like functionality for the Flipper Zero☆22Oct 23, 2023Updated 2 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- Build your own WiFi jammer with an ESP8266.☆23Mar 8, 2017Updated 9 years ago
- A collection of Awesome resources for the Flipper Zero device.☆19Jan 8, 2023Updated 3 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Change your Ip address☆15Feb 27, 2022Updated 4 years ago
- ESP8266 Pen-testing Deauther made into a sonic screwdriver controller.☆16Dec 4, 2021Updated 4 years ago
- Python simulation of "rolljam" attacks☆18Jul 29, 2022Updated 3 years ago
- Simple python client to upload files to the transfer.sh service☆10Dec 19, 2016Updated 9 years ago