hackerschoice / thc-arpmitm
ARP Man-in-the-Middle tool
☆27Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for thc-arpmitm
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆27Updated 5 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆17Updated 3 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆22Updated 5 years ago
- SecrutiyTube Linux Assembly Exam☆10Updated 4 years ago
- ☆15Updated 8 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- THC "R U There" network discovery tool☆26Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆42Updated last year
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 6 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Updated last year
- ☆17Updated 9 months ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Collection of cracked malware☆14Updated 5 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆22Updated 2 years ago
- Secure File Transfer via Global Socket Bounce Network☆24Updated 3 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆46Updated 3 years ago
- Eternalblue & DoublePulsar scanner☆19Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- Driver Attack Platform for Linux☆17Updated last year
- Diebold Accuvote-TSx Election Machine Hacking☆38Updated 4 years ago
- CDitter - Electromechanical based data exfiltration, through the movement of a CD drive☆11Updated 2 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- ☆72Updated 6 years ago