cryptolok / BusAsMLinks
AM radio data exfiltration with CPU cache in assembly
☆20Updated 2 years ago
Alternatives and similar repositories for BusAsM
Users that are interested in BusAsM are comparing it to the libraries listed below
Sorting:
- Rogue AP killer☆91Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Transparent network tap☆122Updated 10 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆158Updated 5 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- ☆147Updated 9 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- ☆90Updated 8 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- pastebin.com Content Monitoring Tool☆194Updated 13 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Updated 5 years ago
- Decept Network Protocol Proxy☆279Updated 3 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 13 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Updated 10 years ago
- Repo for autosnort scripts.☆156Updated 5 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39Updated 8 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 11 years ago
- a low-interaction honeypot☆95Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 8 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- Your bag of handy codes for malware researchers☆120Updated 5 years ago
- SCTP network scanner for discovery and security☆94Updated 4 years ago
- Utility to decompress Linux swsusp hibernation file.☆28Updated 4 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 10 months ago
- Slides from various talks that I've given over the years☆118Updated 2 years ago
- Database of private SSL/SSH keys for embedded devices☆269Updated last year
- ☆111Updated 8 years ago