ervanalb / lensView external linksLinks
Tap live cabling for inspection and injection
☆515Oct 7, 2018Updated 7 years ago
Alternatives and similar repositories for lens
Users that are interested in lens are comparing it to the libraries listed below
Sorting:
- Viewer for Observing Multiple Computers using VNC☆18Feb 13, 2010Updated 16 years ago
- Stargate☆96Aug 6, 2016Updated 9 years ago
- Finds abusive WiFi users using way too much traffic on public wifi and sends them a sack of hot deauth frames☆32Jul 26, 2011Updated 14 years ago
- Easy-as RPC. Zero-server RPC for Python and Java.☆44Aug 23, 2016Updated 9 years ago
- (Unofficial) Python API for http://namechk.com☆20Oct 15, 2015Updated 10 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Mar 10, 2025Updated 11 months ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- Slides from "Betta hide yo downlinks (Building a budget friendly Az/El tracker)" presentation at Cyberspectrum #21☆14Aug 3, 2017Updated 8 years ago
- Wardriving ekoparty☆15Oct 9, 2017Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 11 years ago
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- This is just a basic script that steals handshakes and cleans them this can then be used to crack them and steal wifi passwords, if you h…☆13May 21, 2017Updated 8 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 8 years ago
- software for the Girl Tech IM-Me☆158Feb 28, 2016Updated 9 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- A script to test an RDP host for sticky keys and utilman backdoor.☆262Sep 12, 2016Updated 9 years ago
- Rootkit Arsenal 2nd Source Code☆15Aug 6, 2013Updated 12 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Hack In Paris 2018 Slideware☆18Jul 2, 2018Updated 7 years ago
- Take full control of a OSX user or root account via command line.☆101May 18, 2018Updated 7 years ago
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- USBdriveby exploits the trust of USB devices by emulating an HID keyboard and mouse, installing a cross-platform firewall-evading backdoo…☆1,261Jan 11, 2017Updated 9 years ago
- 📡 On-off keying tools for your SD-arrrR☆143Feb 25, 2023Updated 2 years ago
- initial commit☆174Jun 11, 2018Updated 7 years ago
- Twitter Futures for Python☆58Jun 22, 2014Updated 11 years ago
- ☆75Aug 7, 2015Updated 10 years ago
- BadUSB 2.0 USB-HID MiTM POC☆289Jun 22, 2016Updated 9 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Dec 8, 2022Updated 3 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Jan 11, 2015Updated 11 years ago
- Hacker Warehouse electronic badge that was made for DEF CON 25☆17Aug 8, 2017Updated 8 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decry…☆1,120Mar 2, 2017Updated 8 years ago
- Utility to connect to open WiFi and click through "captive portal"-type agreements.☆364Apr 6, 2013Updated 12 years ago