Wardriving ekoparty
☆15Oct 9, 2017Updated 8 years ago
Alternatives and similar repositories for wardriving
Users that are interested in wardriving are comparing it to the libraries listed below
Sorting:
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- Port scanning and domain utility.☆29Sep 8, 2017Updated 8 years ago
- A software having all stuff related to proxy☆10Feb 12, 2023Updated 3 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- Faraday Continuous Scanning☆34Sep 29, 2016Updated 9 years ago
- Mobile Pentest related stuff☆14Jun 14, 2017Updated 8 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- Cross-platform radio signal visualizer for HackRF & other SDR platforms.☆17Oct 1, 2020Updated 5 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Dec 12, 2017Updated 8 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- Raspberry Pi 2+ MouseJack port for SPI connected NRF24 modules.☆22Sep 27, 2016Updated 9 years ago
- HMAC timing attack's w/ statistical analysis☆23Sep 19, 2013Updated 12 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆20Jun 29, 2016Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- A brief analysis of the BlueBorne Vulnerability Scanner app by Armis☆24Sep 14, 2017Updated 8 years ago
- A Wardriving script for Rasberry Pi v. B☆26Jun 14, 2013Updated 12 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 5 months ago
- openwrt fork for realtek RTL8196C, etc from http://git.advem.lv/rtl819xx/☆22Jun 24, 2017Updated 8 years ago
- Bluetooth wardriving utility☆105Aug 16, 2023Updated 2 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Dec 21, 2015Updated 10 years ago
- ☆35Aug 29, 2012Updated 13 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago
- ☆34Sep 3, 2018Updated 7 years ago
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆31Aug 30, 2017Updated 8 years ago
- Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container☆32Apr 7, 2018Updated 7 years ago
- A multi-threaded Python tool to generate screenshot of websites☆31Dec 3, 2015Updated 10 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆44Jun 29, 2017Updated 8 years ago
- µphisher spear phishing tool (reference implementation)☆40Jun 26, 2020Updated 5 years ago
- ☆35Dec 3, 2024Updated last year
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago