A complete Ruby porting of the ubertooth libraries and utilities.
☆22Nov 16, 2015Updated 10 years ago
Alternatives and similar repositories for rubertooth
Users that are interested in rubertooth are comparing it to the libraries listed below
Sorting:
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17May 8, 2019Updated 6 years ago
- PoWx mission: Aiming at smaller energy per hash hardware.☆11Dec 18, 2021Updated 4 years ago
- hcidump for android☆10Jan 28, 2015Updated 11 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- ☆12May 24, 2015Updated 10 years ago
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 9 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- Password scrambler - small util to make your easy passwords complicated!☆14Sep 14, 2017Updated 8 years ago
- A curated list of awesome Go frameworks, libraries and software☆15May 19, 2017Updated 8 years ago
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- ☆18Dec 16, 2023Updated 2 years ago
- xnu-10.10 mach-o loader that compiles in userland☆19Aug 5, 2015Updated 10 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- BioIdentify is a command line tool for fingerprints feature extraction, 1on1 match and 1onN match .☆23May 29, 2009Updated 16 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- Backup scripts I use on my drives.☆25Nov 26, 2017Updated 8 years ago
- A http/https, socks proxy server, a mitm server and a ssocks server with rules☆26Mar 25, 2019Updated 6 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- NTPD remote DOS exploit and vulnerable container☆25Oct 30, 2017Updated 8 years ago
- Easy to use command line security scanner☆58Feb 27, 2016Updated 10 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- The Zulu fuzzer☆124Sep 25, 2017Updated 8 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Aug 23, 2017Updated 8 years ago
- A web spider for shodan.io without using the Developer API.☆33Jan 4, 2018Updated 8 years ago
- ☆29Apr 28, 2017Updated 8 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- Verilog bit slicing for python☆10May 13, 2021Updated 4 years ago
- Bitcoin Hardware Wallet Interaction scripts☆11Jan 30, 2026Updated last month