hmrc / totp-generator
☆10Updated 7 months ago
Alternatives and similar repositories for totp-generator:
Users that are interested in totp-generator are comparing it to the libraries listed below
- ☆13Updated 7 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 8 years ago
- RFID spoofing code from scanlime.org☆19Updated 12 years ago
- ESP8266 Compatible IR Blaster that accepts HTTP commands for use with services like Amazon Echo☆10Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- Format string exploit generation☆10Updated 9 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated last year
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 5 years ago
- ZigBee hacking tools and scripts☆12Updated 7 years ago
- Network white noise collector☆18Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- PoC Exploit for AOSP UserDictionary Content Provider (CVE-2018-9375)☆21Updated 6 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- ☆16Updated 8 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- DHCP attack tool☆19Updated 5 months ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- Just for some security tools I am making since HomeBrew doesn't like non-popular tools☆9Updated 4 years ago
- Application Security library☆11Updated 12 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 2 weeks ago