Default Password Generator for Time Warner / Spectrum Routers
☆19Jul 27, 2017Updated 8 years ago
Alternatives and similar repositories for twcracker
Users that are interested in twcracker are comparing it to the libraries listed below
Sorting:
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- iOS 14 checkra1n-jailbreak-targeted passcode interposition☆17Nov 18, 2021Updated 4 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- ☆18Jun 25, 2024Updated last year
- Fake DNS server answering every query with the IP of the client☆17Apr 17, 2018Updated 7 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 3 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- This is a collection of tools that make up what we call a "Drop-Pi", primarily used as a quick placement device during a physical/social …☆35Oct 8, 2024Updated last year
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Onion Website Template☆10Oct 24, 2021Updated 4 years ago
- polymorphic webshells☆30Oct 20, 2017Updated 8 years ago
- Proxy tool that bridges the gap between the Sniffle Bluetooth 5 long range extended sniffing and Kismet's ANTSDR capture mechanism. This …☆19Nov 8, 2024Updated last year
- Simple Python script to interact with the Hacker Target API for IP Tools.☆25Jun 15, 2023Updated 2 years ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated 2 weeks ago
- Playground for ESP8266 Projects☆14Nov 29, 2015Updated 10 years ago
- Fake visits to sites on PhantomJS☆28Sep 8, 2018Updated 7 years ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- ESP-IDF and PlatformIO compatible library for a circular queue or circular FIFO buffer over SPIFFS.☆14Mar 28, 2023Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆22Sep 30, 2025Updated 5 months ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Command line interface to interact with hashes.com escrow service.☆44Mar 12, 2026Updated last week
- Skinny Research and Development LoRa Scanner Utility☆22Oct 28, 2024Updated last year
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- A tool for recover router password☆34Jun 19, 2018Updated 7 years ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- Tor command line tools for Mac☆12Jan 20, 2016Updated 10 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Fixed esp32 ieee80211.a lib esp_wifi_80211_tx() function sanity check filter of deauth packets☆20Jul 5, 2023Updated 2 years ago