d4rkcat / killosx
use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range
☆19Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for killosx
- Wireless discovery and exploitation framework written in Python☆18Updated 13 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Wi-Fi Backdoors☆37Updated 9 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆36Updated 10 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- Attacking WPA/WPA encrypted access point without client.☆48Updated 10 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆21Updated 9 years ago
- Simple daemon to create a wifi hotspot on Linux☆13Updated 4 years ago
- GSM Sniffer☆33Updated 13 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- All tools you needed during penetration testing.☆17Updated 7 years ago
- ☆12Updated 10 years ago
- An evolving hacking framework written in python☆11Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 8 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆20Updated 7 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago
- Some exploits for ZeroNights 0x03☆37Updated 9 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- Maltego with a twist of wireless☆25Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- A python script for obfuscating wireless networks☆75Updated 8 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago