defuse / airgap
Design for an economical and simple air-gapped system.
☆28Updated 10 years ago
Alternatives and similar repositories for airgap:
Users that are interested in airgap are comparing it to the libraries listed below
- Install script for grsecurity for Debian environments☆59Updated 9 years ago
- ☆12Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- autoscan - automatic fingerprint of visited networks☆10Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- hemingway is a simple and easy to use spear phishing helper.☆40Updated 8 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 11 years ago
- Repo for the paper "USB Devices phoning home"☆22Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- A python script for obfuscating wireless networks☆77Updated 8 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 9 years ago
- Standalone VPN/Tor WiFi router for journalists and activists☆48Updated 9 years ago
- Broadcast Anonymous Routing - A scalable system for efficient anonymous communications☆76Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Wi-Fi Backdoors☆38Updated 9 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Maltego with a twist of wireless☆25Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago