arthastang / Router-Exploit-ShovelLinks
Automated Application Generation for Stack Overflow Types on Wireless Routers
☆54Updated 6 years ago
Alternatives and similar repositories for Router-Exploit-Shovel
Users that are interested in Router-Exploit-Shovel are comparing it to the libraries listed below
Sorting:
- Simple vulnerability scanning framework☆51Updated 9 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago
- ☆73Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- Firmware analysis website + API☆43Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆60Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- public exploits☆35Updated 2 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- UPnP hacking scripts and tools☆77Updated 9 years ago
- ☆26Updated 5 months ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- Generate pentest reports based on github issues.☆16Updated 3 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 6 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Updated 7 years ago
- ☆15Updated 3 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 8 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Updated 2 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- Pentest Scripts for Apache Vulnerabilities☆30Updated 8 years ago
- ☆25Updated 4 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Updated 6 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Updated 8 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- An example rootkit that gives a userland process root permissions☆78Updated 6 years ago