Automated Application Generation for Stack Overflow Types on Wireless Routers
☆54Jul 15, 2019Updated 6 years ago
Alternatives and similar repositories for Router-Exploit-Shovel
Users that are interested in Router-Exploit-Shovel are comparing it to the libraries listed below
Sorting:
- ☆25May 9, 2021Updated 4 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- Automated 802.1x Bypass☆87Mar 11, 2020Updated 5 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- PoC for the taint-based ROP approach☆14Jul 16, 2023Updated 2 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- ☆128May 22, 2023Updated 2 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Draft of generic instrumentation tool based on QEMU using eBPF to implement trivial instrumentations with trivial code☆18Feb 17, 2020Updated 6 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 7 months ago
- Ditto.☆18Jul 23, 2020Updated 5 years ago
- Tool to brute website sub-domains and dirs.☆49May 13, 2020Updated 5 years ago
- Straight-forward HTTP client testing, assertions included!☆30Nov 20, 2025Updated 3 months ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- SDK-SMS-Stack☆28Jan 4, 2023Updated 3 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- python hash cracker☆52Nov 18, 2024Updated last year
- MemSight: Rethinking Pointer Reasoning in Symbolic Execution (ASE 2017)☆25Nov 21, 2024Updated last year
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆68Jan 15, 2026Updated last month
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Apr 13, 2019Updated 6 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- A Highly Accessible and Automated Virtualization Platform for Security Education☆195Jan 22, 2026Updated last month
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 4 months ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Apr 29, 2021Updated 4 years ago
- Inspector-gadget (a.k.a. PSHAPE - Practical Support for Half-Automated Program Exploitation) is an open source tool which assists analyst…☆27Dec 17, 2019Updated 6 years ago
- ☆107May 28, 2021Updated 4 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- A framework for static analysis of ROP exploits and programs☆41May 13, 2019Updated 6 years ago
- A tool for malicious behavior detection in IoT devices☆77Nov 24, 2018Updated 7 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆111Mar 25, 2021Updated 4 years ago