firefart / UARTBruteForcerLinks
☆18Updated 9 years ago
Alternatives and similar repositories for UARTBruteForcer
Users that are interested in UARTBruteForcer are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- Rogue Synergy server☆18Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Here comes the paintrain!☆11Updated 9 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- ☆26Updated 5 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 9 years ago
- \ PowerAvails Powershell /☆12Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- All the content from my Troopers 19 talk☆12Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Updated 8 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆31Updated 9 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 10 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Hostile Dropboxes Management☆26Updated 5 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago