bbqlinux / android-udev-rules
☆17Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for android-udev-rules
- GSM Sniffer☆33Updated 13 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆79Updated 11 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- ☆28Updated 8 years ago
- Password cracking utility☆51Updated 3 years ago
- Scripts for Kali on Android.☆8Updated 10 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆19Updated 9 years ago
- Pastenum is a text dump enumeration tool.☆14Updated 10 years ago
- autoscan - automatic fingerprint of visited networks☆10Updated 11 years ago
- cSploit traffic manipulator☆27Updated 7 years ago
- (Abandoned) Extract packages from an Android device☆51Updated 3 years ago
- A sample android application implementing Moxie's Certificate Pinning Library☆8Updated 9 years ago
- Android Connections Forensics☆33Updated 8 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆19Updated 8 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆29Updated 11 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 13 years ago
- XMLRPC server for password cracking☆32Updated 9 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- A simple tool to dump users in popular forums and CMS :)☆28Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- An evolving hacking framework written in python☆11Updated 9 years ago
- Testing page for checking the privileges that a browser gives to the file:// origin☆10Updated 8 years ago
- A review of the security testing tools publicly available through the Kali Linux Repos.☆21Updated 10 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 9 years ago
- cSploit network radar☆29Updated 8 years ago