bbaranoff / LTE-Redirection_AttackLinks
Force target victim to unsafe network
☆26Updated last month
Alternatives and similar repositories for LTE-Redirection_Attack
Users that are interested in LTE-Redirection_Attack are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆21Updated 7 months ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆77Updated last month
- OpenDrone ID sniffer/spoofer for Bluetooth + WIFI☆23Updated 4 months ago
- OSDP attack tool (and the Elvish word for friend)☆100Updated last year
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated 2 years ago
- Kiwi PN532 SPI library for Arduino☆12Updated 2 months ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆74Updated 8 months ago
- ☆41Updated last year
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 7 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆61Updated 7 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- wsnet☆26Updated last month
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆41Updated 5 months ago
- Slides and videos from talks given at cons☆22Updated 3 weeks ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 3 months ago
- ☆20Updated last year
- Sample configuration to include as an Asterisk configuration to supplement automated caller ID spoofing capabilities.☆27Updated 4 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 8 months ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated 9 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 5 months ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- A collection of statically-linked tools targeted to run on almost any linux system.☆30Updated 4 months ago
- Gadget IoC removal from HAK5's BashBunny☆20Updated last year
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- DJI Drone Control Hijacking☆34Updated last year
- A sniffer for Bluetooth 5 and 4.x LE☆96Updated 6 months ago