ebux / Cable-modemsLinks
☆26Updated 8 years ago
Alternatives and similar repositories for Cable-modems
Users that are interested in Cable-modems are comparing it to the libraries listed below
Sorting:
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- Leveraging CWMP (CPE WAN Management Protocol) to extract vendor specific secrets and configurations from CPEs☆12Updated 6 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- ☆32Updated 9 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 11 years ago
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆63Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Different tools for different routers.☆56Updated last year
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆103Updated 4 years ago
- Automatically exported from code.google.com/p/pac4mac☆40Updated 6 years ago
- POLAR☆73Updated 6 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Updated 5 months ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- Beagle(bone) in the Middle☆25Updated 4 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 6 years ago
- Utility to decompress Linux swsusp hibernation file.☆28Updated 3 years ago
- Script that dumps running process memory from Linux systems using /proc.☆79Updated 11 years ago
- ☆113Updated 8 years ago
- ☆25Updated 7 years ago
- PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.☆30Updated 5 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Automatically exported from code.google.com/p/miranda-upnp☆65Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Updated 9 years ago