curlyboi / hashtopus-agent
Agent part of Hashtopus
☆17Updated 7 years ago
Alternatives and similar repositories for hashtopus-agent:
Users that are interested in hashtopus-agent are comparing it to the libraries listed below
- Distributed wrapper around oclHashcat☆88Updated 4 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 2 years ago
- ☆15Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Hashcat Bash Scripts for bulk hash file processing☆52Updated 8 years ago
- Magnetic stripe spoofer implementing audio waves.☆37Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆106Updated 10 years ago
- js-beautifier extension for Burp Suite☆30Updated 11 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 10 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- swiss army knife of ISM RF!☆24Updated 7 years ago
- Improved version. Based off original CopyClass Code From Meriac http://www.openpcd.org/HID_iClass_demystified☆29Updated 10 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆21Updated 7 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆29Updated 8 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Updated 11 years ago
- ☆12Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- Peanuts is a free and open source wifi tracking tool. Based on the SensePosts Snoopy-NG project that is now closed.☆39Updated 3 years ago
- ☆18Updated 9 years ago