codetojoy / talk_maritimedevcon_groovyLinks
Demo code for talk at Maritime DevCon 2016.
☆14Updated 9 years ago
Alternatives and similar repositories for talk_maritimedevcon_groovy
Users that are interested in talk_maritimedevcon_groovy are comparing it to the libraries listed below
Sorting:
- hacking tools awesome lists☆16Updated 8 years ago
- A web front-end for password cracking and analytics☆16Updated 7 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Updated 3 years ago
- Tools for attacking various MIFARE RFID cards☆16Updated 6 years ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆85Updated last year
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- Collection and Roadmap for everyone who wants DevSecOps, contains list of tools and methodologies☆19Updated 3 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Updated 3 years ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 5 years ago
- USB testing framework☆14Updated 2 years ago
- The all-in-one hacking toolbox for hardware penetration testing.☆18Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 4 years ago
- Write-Ups for TryHackMe☆23Updated 4 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Updated last year
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 8 months ago
- A blog describing general hardware and software reverse engineering.☆18Updated 2 years ago
- Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This …☆18Updated last year
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21Updated 2 years ago
- Fetch information about a public Google document.☆13Updated 2 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆47Updated 2 weeks ago
- Yet another OSINT automator.☆18Updated 5 years ago
- iWar - The intelligent war dialer.☆29Updated 5 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆17Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 3 weeks ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- An accurated list of things to test while pentesting☆11Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 3 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Updated 9 years ago
- ☆10Updated 2 years ago
- An intentionally-vulnerable web application, ported from https://github.com/jzheaux/terracotta-bank-spring☆42Updated 3 years ago