donctl / sandyLinks
Release of the sandy framework.
☆39Updated 11 years ago
Alternatives and similar repositories for sandy
Users that are interested in sandy are comparing it to the libraries listed below
Sorting:
- An ELF parasite command injector.☆34Updated 8 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 14 years ago
- Format string exploit generation☆10Updated 10 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnera…☆17Updated 3 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Parallel APK analyzer☆51Updated 9 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 11 years ago
- SIM Card tunnel for Alcatel OT-918D☆38Updated 11 years ago
- LPE exploits for Secret Net and Secret Net Studio☆52Updated 9 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Updated 8 years ago
- Android Data Extractor Lite☆130Updated 10 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆48Updated 9 years ago
- Automated GUI testing utility developed for Marvin-dynamic-analyzer.☆16Updated 9 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 12 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- Native Android software for dumping memory from Android processes☆14Updated 11 years ago
- Vulnerability Reports by Aleph Research☆35Updated last year
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago
- ☆48Updated 9 years ago
- Public resources NB shares☆18Updated 9 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Updated 10 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 10 months ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago