bbaranoff / LTE-Redirection_AttackLinks
Force target victim to unsafe network
☆26Updated 2 months ago
Alternatives and similar repositories for LTE-Redirection_Attack
Users that are interested in LTE-Redirection_Attack are comparing it to the libraries listed below
Sorting:
- Card calculator and Proxmark3 Plugin for writing and/or simulating every card type that Doppelgänger Community, Pro, Stealth, and MFAS su…☆21Updated 8 months ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆80Updated last week
- Lena's scripts/code/resources for malware analysis☆27Updated last year
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆12Updated 2 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 8 months ago
- Kiwi PN532 SPI library for Arduino☆16Updated last month
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- OSDP attack tool (and the Elvish word for friend)☆100Updated 2 years ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 8 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆65Updated 11 months ago
- A user enumeration tool for Slack.☆30Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 5 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- File Manager☆12Updated this week
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated 9 months ago
- ☆35Updated last year
- 🎥 Spytruder: Advanced RTSP Camera Discovery and Vulnerability Assessment Tool☆17Updated last month
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated 11 months ago
- DJI Drone Control Hijacking☆34Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- wsnet☆26Updated last month
- A collection of statically-linked tools targeted to run on almost any linux system.☆30Updated 5 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 10 months ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 4 months ago
- ☆24Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 6 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated last year