domienschepers / wifi-frameworkLinks
Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.
☆246Updated 7 months ago
Alternatives and similar repositories for wifi-framework
Users that are interested in wifi-framework are comparing it to the libraries listed below
Sorting:
- A full-featured open-source Wi-Fi fuzzer☆193Updated last month
- ☆278Updated 3 years ago
- Bluetooth Security Assessment Methodology☆138Updated last year
- ✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …☆336Updated last year
- An automatic Blind ROP exploitation tool☆207Updated 2 years ago
- ☆207Updated last year
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆194Updated 11 months ago
- PoC_CVEs☆166Updated this week
- This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices☆200Updated 4 months ago
- Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera☆97Updated last year
- ☆102Updated 9 months ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- PENIOT: Penetration Testing Tool for IoT☆228Updated 3 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆105Updated 2 years ago
- Hack-A-Sat Qualifiers Writeups☆256Updated 2 years ago
- Hack-a-Sat 4 2023 - Finals Public Release☆56Updated 2 years ago
- ☆113Updated last year
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,…☆111Updated 5 months ago
- ☆130Updated 2 years ago
- Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)☆224Updated 3 years ago
- exploits for CVE-2024-20017☆141Updated last year
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆610Updated 2 months ago
- Collected && Written N day Vulns for study purpose only☆106Updated 4 months ago
- ☆233Updated last year
- CVEs and Techniques used PDF as an attack vector.☆100Updated 3 years ago
- smod is a modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol☆19Updated 6 years ago
- A vehicle network analysis and attack tool.☆114Updated 4 years ago
- OS Command Injection Vulnerability Payload List☆51Updated 4 years ago
- 🐳 VMs are bloat. Dockerise your VAPT environment☆79Updated 7 months ago
- ☆42Updated 2 years ago