☆94Aug 17, 2020Updated 5 years ago
Alternatives and similar repositories for 4CAN
Users that are interested in 4CAN are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Security analysis toolkit for proprietary car protocols☆785Feb 21, 2022Updated 4 years ago
- Framework for exploiting local vulnerabilities☆83Nov 18, 2023Updated 2 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- Dynamic android vulnerability scanner using OpenNebula and Android-x86 emulators.☆42Feb 24, 2017Updated 9 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- MySQL Injection Exfoliation Optimization☆24Sep 15, 2019Updated 6 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Dec 31, 2018Updated 7 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆249Sep 9, 2021Updated 4 years ago
- Get clients and access points.☆48Aug 28, 2019Updated 6 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 6 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆112Oct 11, 2018Updated 7 years ago
- Operational Security utility and automator.☆142Jul 21, 2020Updated 5 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- ☆20Jun 2, 2016Updated 9 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Jan 15, 2020Updated 6 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- CANToolz - Black-box CAN network analysis framework☆299May 7, 2023Updated 2 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- Car Backdoor Maker☆220Oct 1, 2018Updated 7 years ago
- Multi-Purpose DNS Server☆144Jun 4, 2025Updated 9 months ago
- Unofficial API & Client for dnsdumpster.com and hackertarget.com☆67Feb 9, 2019Updated 7 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- SDK-SMS-Stack☆28Jan 4, 2023Updated 3 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Jan 7, 2020Updated 6 years ago
- "Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones" ACSAC 2019☆157Mar 28, 2021Updated 4 years ago
- A tool for malicious behavior detection in IoT devices☆77Nov 24, 2018Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago