arthastang / Router-Exploit-ShovelLinks
Automated Application Generation for Stack Overflow Types on Wireless Routers
☆54Updated 6 years ago
Alternatives and similar repositories for Router-Exploit-Shovel
Users that are interested in Router-Exploit-Shovel are comparing it to the libraries listed below
Sorting:
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- ☆73Updated 6 years ago
- Simple vulnerability scanning framework☆51Updated 9 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- ☆25Updated 2 months ago
- Firmware analysis website + API☆43Updated 5 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- Generate pentest reports based on github issues.☆16Updated 2 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year
- ☆15Updated 2 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- public exploits☆35Updated 2 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 6 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 8 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Updated 5 years ago
- Slides from my talk at ISC 2018 in Beijing 2018☆94Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- Double-Free BUG in WhatsApp exploit poc.☆97Updated 5 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago