beave / iwar2
iWar2 - The war dialer
☆12Updated 7 years ago
Alternatives and similar repositories for iwar2
Users that are interested in iwar2 are comparing it to the libraries listed below
Sorting:
- A Voip Wardialer for the phreaking of 2020☆55Updated 10 months ago
- See here:☆42Updated 12 years ago
- iWar - The intelligent war dialer.☆28Updated 5 years ago
- SimBrush - SIM data carver and wrapper☆20Updated 13 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- ☆57Updated 11 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 12 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 4 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Transforms any file into a protected ELF executable☆28Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- ☆17Updated 8 years ago
- Files compiled from the Logica breach investigation materials☆44Updated 6 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆21Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Solutions for various crackmes☆20Updated 12 years ago
- SAVIORBURST☆21Updated 9 years ago
- ☆32Updated 5 years ago
- USB Attack Development Platform☆31Updated 6 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- Read-only Slack RTM API CLI for monitoring teams☆10Updated 6 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago