fboldewin / ATM-Hacking-ISC2018
Slides from my talk at ISC 2018 in Beijing 2018
☆92Updated 6 years ago
Alternatives and similar repositories for ATM-Hacking-ISC2018:
Users that are interested in ATM-Hacking-ISC2018 are comparing it to the libraries listed below
- The router hacking repo.☆33Updated 9 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 5 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- Phishing webapp generator☆41Updated 6 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆33Updated 5 years ago
- Simple Karma Attack☆67Updated 4 years ago
- Arduino Rubber Ducky Framework☆107Updated 5 years ago
- The goal of this program is to quickly pull and install repos from its list☆39Updated 2 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Automated Pentest Tools Designed For Parrot Linux☆85Updated 5 years ago
- Gathering Email Information Tool☆37Updated 8 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- ☆102Updated 5 years ago
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.☆43Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆52Updated 6 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago