chokepoint / Andrena
Simple multi-stream protocol for use with ZigBee wireless modules. Adds an additional layer of encryption and allows advanced streams such as file transfers.
☆9Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for Andrena
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- recon framework in ruby☆13Updated 12 years ago
- SEQ/Ack signature triggered SSL back connect☆10Updated 8 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 8 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 9 years ago
- Malware Analysis Zoo☆25Updated 7 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆11Updated 11 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 10 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- SSH Multipot☆22Updated 6 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- ☆15Updated 8 years ago
- python based backdoor software☆17Updated 13 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- A multi service threaded MD5 cracker☆65Updated 8 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13Updated 8 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago