donctl / sandyLinks
Release of the sandy framework.
☆39Updated 11 years ago
Alternatives and similar repositories for sandy
Users that are interested in sandy are comparing it to the libraries listed below
Sorting:
- An ELF parasite command injector.☆34Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 12 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Updated 11 years ago
- Aranea is a fast and clean dns spoofing tool.☆17Updated 14 years ago
- Native Android software for dumping memory from Android processes☆14Updated 11 years ago
- Android Data Extractor Lite☆130Updated 10 years ago
- various exploits☆32Updated 13 years ago
- Broadpwn bug (CVE-2017-9417)☆51Updated 8 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Updated 11 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 12 years ago
- ☆48Updated 9 years ago
- The development place of AFFT, a toolkit to automatically acquire and extract data from Android image dumps☆48Updated 9 years ago
- Format string exploit generation☆10Updated 10 years ago
- Password cracking utility☆54Updated 4 years ago
- ☆17Updated 4 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Attacking WPA/WPA encrypted access point without client.☆51Updated 12 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 15 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12Updated 10 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Updated 8 years ago
- Android Connections Forensics☆33Updated 10 years ago