exploitsecurityio / DVRPiLinks
DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.
☆41Updated 2 months ago
Alternatives and similar repositories for DVRPi
Users that are interested in DVRPi are comparing it to the libraries listed below
Sorting:
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆65Updated last year
- ☆80Updated 2 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- ☆76Updated last year
- ☆49Updated 10 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 7 months ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Rebuild of portspoof in GO with additional features.☆26Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- Signature based honeypot detector tool written in Golang☆107Updated 9 months ago
- DEFCON 31 slide deck and video link☆66Updated 7 months ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆69Updated 3 weeks ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 3 years ago
- Random things for my own reference☆22Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- Living Off Security Tools☆58Updated last month
- ☆81Updated 3 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated last month
- ☆15Updated 2 months ago
- All kinds of tiny shells☆65Updated 2 years ago
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Updated last year
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆42Updated last year
- God Mode Detection Rules☆134Updated last year