exploitsecurityio / DVRPiLinks
DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.
☆41Updated 2 months ago
Alternatives and similar repositories for DVRPi
Users that are interested in DVRPi are comparing it to the libraries listed below
Sorting:
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆65Updated last year
- Rebuild of portspoof in GO with additional features.☆26Updated 2 months ago
- ☆18Updated last year
- All kinds of tiny shells☆65Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- create a "simulated internet" cyber range environment☆19Updated 7 months ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆47Updated last week
- ☆76Updated last year
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆117Updated last year
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆74Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated 2 weeks ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆69Updated 3 weeks ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Updated 11 months ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆25Updated 3 years ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- tool for identifying guest relationships between companies☆103Updated last year
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆22Updated last year
- DEFCON 31 slide deck and video link☆66Updated 7 months ago
- Source code and examples for Antignis☆44Updated 3 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Bloodhound Portable for Windows☆53Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated last month