dhishan / UPnP-HackLinks
☆81Updated 9 years ago
Alternatives and similar repositories for UPnP-Hack
Users that are interested in UPnP-Hack are comparing it to the libraries listed below
Sorting:
- UPnP hacking scripts and tools☆77Updated 9 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆69Updated 8 years ago
- LOCAL ROOT EXPLOITS☆39Updated 7 years ago
- A quick and dirty python script to embed a Metasploit generated APK file into another APK for fun.☆144Updated 2 years ago
- CVE-2019-1652 /CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!☆227Updated 6 years ago
- Real world and CTFs exploiting web/binary POCs.☆79Updated 5 years ago
- Exploit Pack - Project☆73Updated 6 years ago
- A minimal DNS service that can provide spoofed replies☆102Updated 2 years ago
- Resources to help get started with IoT Pentesting☆169Updated 7 years ago
- Krack POC☆126Updated 7 years ago
- ☆73Updated 6 years ago
- Game of Thrones hacking CTF (Capture the flag)☆64Updated 10 months ago
- Various local exploits☆148Updated 3 years ago
- NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities☆108Updated last year
- Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack☆87Updated 4 years ago
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆80Updated 7 years ago
- Tool to communicate with RPC services and check misconfigurations on NFS shares☆63Updated 6 years ago
- A bunch of my exploit development helper tools, collected in one place.☆145Updated 3 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- Toolkit for implant attack of IoT devices☆137Updated 7 years ago
- Double-Free BUG in WhatsApp exploit poc.☆98Updated 5 years ago
- Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]☆90Updated 4 years ago
- HikPwn, a simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8.☆126Updated 4 years ago
- Some personal exploits/pocs☆56Updated 5 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 6 years ago
- Find infected ms17-010 machines☆14Updated 8 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- Linux kernel exploits for local privilege escalation☆81Updated 7 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- Scripts I used during CTP☆68Updated 5 years ago