cktben / dc24_badge
New firmware for the DEFCON 24 badge
☆8Updated 8 years ago
Alternatives and similar repositories for dc24_badge:
Users that are interested in dc24_badge are comparing it to the libraries listed below
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆43Updated 6 years ago
- ☆25Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago
- ☆28Updated 4 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Carve shellcode within the memory using restrictive character set☆8Updated 7 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- My collection of dockerfiles☆24Updated 9 years ago
- misc pentest tools.☆26Updated 10 years ago
- Beagle(bone) in the Middle☆25Updated 4 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆56Updated 9 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Weape-Wireless-EAP-Extractor☆29Updated 11 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- BurpJDSer-ng☆28Updated last week
- A framework for creating modular bots/backdoors☆21Updated 9 years ago
- ☆17Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆25Updated 9 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Metasploit Red Team Competition Modules☆13Updated 14 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago