fboldewin / ATM-Hacking-ISC2018Links
Slides from my talk at ISC 2018 in Beijing 2018
☆94Updated 6 years ago
Alternatives and similar repositories for ATM-Hacking-ISC2018
Users that are interested in ATM-Hacking-ISC2018 are comparing it to the libraries listed below
Sorting:
- Automated Pentest Tools Designed For Parrot Linux☆84Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- The router hacking repo.☆34Updated 10 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 6 years ago
- Arduino Rubber Ducky Framework☆107Updated 6 years ago
- A simple XSS finding tool☆110Updated 7 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Updated 6 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- unix SSH post-exploitation 1337 tool☆142Updated 7 years ago
- Sends some one a malicious payload through smtp and starts a listener with metasploit.☆36Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.☆43Updated 5 years ago
- Framework for exploiting local vulnerabilities☆84Updated 2 years ago
- NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities☆108Updated last year
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 8 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Updated 6 years ago
- A tool to generate media files with malicious metadata☆129Updated 7 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆55Updated 7 years ago
- cve-2018-10933 libssh authentication bypass☆109Updated last week
- Massive arsenal of hacker tools...☆79Updated 8 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 4 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Updated 3 weeks ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 7 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆44Updated 5 years ago
- ☆92Updated 3 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88Updated 7 years ago
- Red Login: SSH Brute-force Tools☆106Updated 7 years ago