This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to attack strings, and crash the scanner.
☆24Oct 11, 2015Updated 10 years ago
Alternatives and similar repositories for jammer
Users that are interested in jammer are comparing it to the libraries listed below
Sorting:
- ☆16Jan 31, 2015Updated 11 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- Wireless Attacks in Python (Based on Blog Series)☆92Nov 16, 2013Updated 12 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Python automated wifi jammer☆40Mar 24, 2016Updated 9 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- A program used to communicate with iBoot / iBSS using the libusb-1.0 api.☆16Aug 15, 2010Updated 15 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Scripts that aren't PowerShell☆48Jan 13, 2020Updated 6 years ago
- Miscellaneous analysis tools☆25Mar 3, 2015Updated 11 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- ECE 209 Security of Embedded Systems Project☆16Mar 17, 2018Updated 7 years ago
- Socrates is a thin wrapper around an early-stage [AllenNLP](https://allennlp.org/) model that enables machine reading comprehension (MRC)…☆14Jan 12, 2021Updated 5 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- ☆55Jul 20, 2017Updated 8 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- ☆15Dec 4, 2022Updated 3 years ago
- This library was created in order to evaluate the effectiveness of any kind of algorithm used in IR systems and analyze how well they per…☆15Apr 15, 2020Updated 5 years ago
- MiFare Classic 1k Smart Card MFOC Nested Attack☆14Feb 8, 2018Updated 8 years ago
- A plugin for Burp Suite Pro to work with attacker payloads and automatically generate check digits for credit card numbers and similar nu…☆11Jun 3, 2015Updated 10 years ago
- lojax_uefi_rootkit_checker☆19Nov 18, 2018Updated 7 years ago
- Proof Of Concept of a SRIX4K emulator☆20Mar 11, 2022Updated 3 years ago
- C code metamorphic obfuscator☆13Feb 20, 2015Updated 11 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Build your own WiFi jammer with an ESP8266.☆21Mar 8, 2017Updated 8 years ago
- Python simulation of "rolljam" attacks☆18Jul 29, 2022Updated 3 years ago
- XSS Weaponization☆34Sep 23, 2013Updated 12 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 4 months ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- A collection of Awesome resources for the Flipper Zero device.☆19Jan 8, 2023Updated 3 years ago
- This repository contains some modified gap.c file options of the Flipper's BLE function, which can be used to simulate ADV Packet Spoofin…☆15Sep 9, 2023Updated 2 years ago