arthastang / Router-Exploit-ShovelLinks
Automated Application Generation for Stack Overflow Types on Wireless Routers
☆53Updated 6 years ago
Alternatives and similar repositories for Router-Exploit-Shovel
Users that are interested in Router-Exploit-Shovel are comparing it to the libraries listed below
Sorting:
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Firmware analysis website + API☆43Updated 4 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Generate pentest reports based on github issues.☆16Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45Updated 6 years ago
- ☆74Updated 6 years ago
- ☆25Updated last year
- Exploitation challenges for CTF☆63Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 7 years ago
- public exploits☆35Updated 2 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆54Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆59Updated 11 months ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆15Updated 6 years ago
- Pentest Scripts for Apache Vulnerabilities☆31Updated 7 years ago
- Group Policy Hijacking☆32Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Updated 6 years ago
- ☆15Updated 2 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆20Updated 8 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Creating a vulnerable environment and the PoC☆15Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 7 years ago
- ☆18Updated 6 years ago
- The Python Password-Protected Obfuscator☆34Updated 6 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago