beave / iwar2
iWar2 - The war dialer
☆12Updated 7 years ago
Alternatives and similar repositories for iwar2:
Users that are interested in iwar2 are comparing it to the libraries listed below
- Parses DNS responses in a secure, rigorous manner☆22Updated 4 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 7 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- An overlay that verifies signed ELF binaries☆9Updated 9 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- ☆17Updated 7 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- Popping boxes with Nmap☆17Updated 12 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 10 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Diaphora, a Free and Open Source program diffing tool☆22Updated 5 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆39Updated 11 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Updated 8 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- See here:☆42Updated 12 years ago
- ☆12Updated 6 months ago
- advanced code generator for John the Ripper☆12Updated 6 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 3 months ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- iWar - The intelligent war dialer.☆27Updated 4 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- Yara syntax highlighting☆25Updated 3 years ago
- intel amt honeypot☆18Updated 7 years ago
- DHCP option injector☆40Updated 4 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- A Voip Wardialer for the phreaking of 2020☆54Updated 7 months ago
- Heap analysis tooling for mempool☆13Updated 2 years ago