beave / iwar2
iWar2 - The war dialer
☆12Updated 7 years ago
Alternatives and similar repositories for iwar2:
Users that are interested in iwar2 are comparing it to the libraries listed below
- PCILeech HP iLO4 Service☆23Updated 6 years ago
- A Voip Wardialer for the phreaking of 2020☆55Updated 10 months ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 12 years ago
- advanced code generator for John the Ripper☆13Updated 6 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 11 years ago
- ☆23Updated 4 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆11Updated 4 years ago
- Dump GNU IFUNC implementation offsets from libc☆10Updated 2 years ago
- iWar - The intelligent war dialer.☆28Updated 5 years ago
- Popping boxes with Nmap☆18Updated 13 years ago
- See here:☆42Updated 12 years ago
- ☆15Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- ☆57Updated 11 years ago
- Reading, writing and analysis of magnetic stripe information☆25Updated 14 years ago
- ☆17Updated 8 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 10 years ago
- Execute system calls over the network☆11Updated 10 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- ☆10Updated 7 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Updated 6 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Miscellaneous IDA scripts and projects☆13Updated 4 years ago