bbaranoff / LTE-Redirection_AttackLinks
Force target victim to unsafe network
☆26Updated 4 months ago
Alternatives and similar repositories for LTE-Redirection_Attack
Users that are interested in LTE-Redirection_Attack are comparing it to the libraries listed below
Sorting:
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆85Updated last month
- wsnet☆26Updated last week
- OSDP attack tool (and the Elvish word for friend)☆101Updated 2 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated 2 years ago
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆25Updated 10 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 6 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 9 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆16Updated last year
- Discover Non-Discoverable Bluetooth Classic devices☆12Updated 11 months ago
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Updated 5 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- File Manager☆12Updated last month
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 8 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆54Updated 2 years ago
- Kiwi PN532 SPI library for Arduino☆16Updated 2 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 10 months ago
- OpenDrone ID sniffer/spoofer for Bluetooth + WIFI☆25Updated last month
- GitHub CVE Repository Hunt☆19Updated last year
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆19Updated 2 months ago
- ECC Public Key Cryptography☆38Updated last year
- DJI Drone Control Hijacking☆35Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- ☆28Updated 2 years ago
- A collection of statically-linked tools targeted to run on almost any linux system.☆31Updated last month
- A user enumeration tool for Slack.☆31Updated last year