exploitsecurityio / DVRPiLinks
DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.
☆42Updated 3 months ago
Alternatives and similar repositories for DVRPi
Users that are interested in DVRPi are comparing it to the libraries listed below
Sorting:
- ☆18Updated last year
- Rebuild of portspoof in GO with additional features.☆28Updated 3 months ago
- All kinds of tiny shells☆65Updated 3 years ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆66Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated 2 months ago
- create a "simulated internet" cyber range environment☆19Updated last week
- ☆80Updated 2 years ago
- self-hosted Azure OSINT tool☆32Updated 7 months ago
- Timestomp Tool to flatten MAC times with a specific timestamp☆49Updated 2 months ago
- EvilMist is a collection of scripts and utilities designed to support cloud penetration testing & red teaming. The toolkit helps identify…☆87Updated last week
- tool for identifying guest relationships between companies☆102Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- Living Off Security Tools☆58Updated 2 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 9 months ago
- Covert data exfiltration via DNS☆51Updated 11 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84Updated 8 months ago
- ☆49Updated 11 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆75Updated last year
- Canary Detection☆187Updated 3 months ago
- DEFCON 31 slide deck and video link☆66Updated 8 months ago
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 4 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆47Updated last month
- Source code and examples for Antignis☆44Updated 3 years ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆115Updated last year
- A user enumeration tool for Slack.☆35Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆24Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆126Updated last month