RPL attacks framework for simulating WSN with a malicious mote based on Contiki
☆81Jul 15, 2025Updated 7 months ago
Alternatives and similar repositories for rpl-attacks
Users that are interested in rpl-attacks are comparing it to the libraries listed below
Sorting:
- Devkit for quickly creating client bots for remote communications☆15Jun 17, 2025Updated 8 months ago
- An Intrusion Detection System for Contiki OS☆19Apr 18, 2020Updated 5 years ago
- Cron-like system based on Nextdoor Scheduler, PyBots and Tinyscript☆15Dec 3, 2023Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Devkit for quickly building CLI tools with Python☆55Updated this week
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Assists in mass exportation of Nessus scans☆19Apr 20, 2018Updated 7 years ago
- The open-source bearer crypto card☆13Feb 18, 2026Updated 2 weeks ago
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- A scapy based module for programming offensive and defensive networking tools easier than before.☆17Mar 17, 2021Updated 4 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- A simple, pure JavaScript implementation decoding PowerShell's SecureString objects for analysis.☆30Mar 31, 2023Updated 2 years ago
- ☆18May 3, 2021Updated 4 years ago
- ☆22May 29, 2020Updated 5 years ago
- "Broken NAT" - A suite of tools focused on detecting and interacting with publicly available BNAT scenerios☆25Aug 17, 2014Updated 11 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- A malware dataset curation tool which helps identify packed samples.☆33Oct 24, 2018Updated 7 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- ☆33Apr 20, 2022Updated 3 years ago
- xResolver - Xbox Resolver and PSN Resolver with Gamertag IP Puller☆17Apr 27, 2021Updated 4 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Aug 7, 2020Updated 5 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆33Jun 28, 2022Updated 3 years ago
- ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Ima…☆41Jun 6, 2023Updated 2 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- PassWord List Maker☆17Oct 29, 2018Updated 7 years ago
- Password spraying script and helper for creating password lists☆34Sep 4, 2020Updated 5 years ago
- a simple discord app token grabber in batch which is fully undetected☆10Aug 9, 2022Updated 3 years ago
- ☆13Nov 5, 2024Updated last year
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Some malware samples or suspicious files I found and their reports.☆38Nov 28, 2021Updated 4 years ago
- CyberSniff Desktop Client☆18Jul 13, 2022Updated 3 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- ☆11Oct 13, 2025Updated 4 months ago
- CS-FW is a high-performance CS 1.6 firewall based on Linux XDP.☆11Aug 15, 2023Updated 2 years ago
- Herramienta que automatiza el uso del hashcat para crackear contraseñas☆13Oct 23, 2020Updated 5 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago