Tap live cabling for inspection and injection
☆514Oct 7, 2018Updated 7 years ago
Alternatives and similar repositories for lens
Users that are interested in lens are comparing it to the libraries listed below
Sorting:
- Stargate☆96Aug 6, 2016Updated 9 years ago
- Viewer for Observing Multiple Computers using VNC☆19Feb 13, 2010Updated 16 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- Easy-as RPC. Zero-server RPC for Python and Java.☆44Aug 23, 2016Updated 9 years ago
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- Writeups for the RHME2 CTF☆14Mar 6, 2017Updated 9 years ago
- Utility to connect to open WiFi and click through "captive portal"-type agreements.☆364Apr 6, 2013Updated 12 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- Slides from "Betta hide yo downlinks (Building a budget friendly Az/El tracker)" presentation at Cyberspectrum #21☆14Aug 3, 2017Updated 8 years ago
- Slide deck and demo code for my DEFCON 26 talk☆11Aug 17, 2018Updated 7 years ago
- 📡 On-off keying tools for your SD-arrrR☆144Feb 25, 2023Updated 3 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 9 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Aug 11, 2023Updated 2 years ago
- Reticle is a C&C network for small devices that want to be friends.☆90Mar 11, 2014Updated 12 years ago
- software for the Girl Tech IM-Me☆158Feb 28, 2016Updated 10 years ago
- An Open Source tool for RF reverse engineering.☆438Nov 16, 2019Updated 6 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- ☆210Jan 30, 2019Updated 7 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- ☆110May 14, 2018Updated 7 years ago
- ☆76Aug 7, 2015Updated 10 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,260Jan 11, 2017Updated 9 years ago
- A script to test an RDP host for sticky keys and utilman backdoor.☆263Sep 12, 2016Updated 9 years ago
- ☆15Oct 1, 2013Updated 12 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks☆355Sep 4, 2019Updated 6 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- RF430FRL152H examples for NFC Type V in Kicad and C.☆78Jan 2, 2020Updated 6 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- Packer stuff to build a pfSense vagrant box.☆14Jul 7, 2017Updated 8 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- Device discovery tools and encrypted keystroke injection advisories for Logitech, Dell, Lenovo and AmazonBasics☆107Jul 27, 2016Updated 9 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- WarBerryPi - Tactical Exploitation☆2,227Nov 9, 2019Updated 6 years ago
- ☆10Aug 29, 2018Updated 7 years ago