ebux / Cable-modems
☆26Updated 8 years ago
Alternatives and similar repositories for Cable-modems:
Users that are interested in Cable-modems are comparing it to the libraries listed below
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 6 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- ☆112Updated 7 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- ☆14Updated 4 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- Packet-o-matic NG !☆65Updated 8 months ago
- Leveraging CWMP (CPE WAN Management Protocol) to extract vendor specific secrets and configurations from CPEs☆12Updated 6 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 7 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Miscellaneous Tools☆38Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆79Updated 5 years ago
- ☆137Updated 7 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Updated 6 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- THC "R U There" network discovery tool☆27Updated 4 years ago
- X41 Smartcard Fuzzer☆117Updated 6 years ago