kevin2600 / RFIDler-HID26-BruteForceLinks
Proof of Concept of HID26 Bruteforce
☆29Updated 3 years ago
Alternatives and similar repositories for RFIDler-HID26-BruteForce
Users that are interested in RFIDler-HID26-BruteForce are comparing it to the libraries listed below
Sorting:
- Exploiting Edge's read:// urlhandler☆15Updated 4 years ago
- Web Exploitation Framework - Beta Release☆24Updated 10 years ago
- Wifi Pineapple - Repository, Issue tracker, Wiki☆40Updated 13 years ago
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆108Updated 9 years ago
- BTLE Dog&Bone smart lock hacking -- Ozlockcon 2017☆21Updated 8 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 12 years ago
- EQGRP-Free-Files here.,☆46Updated 9 years ago
- ARP poison and sniff with DNS spoofing, urlsnarf, driftnet, ferret, dsniff, sslstrip and tcpdump☆26Updated 10 years ago
- Proof-of-Concept code for exploits☆82Updated 9 years ago
- ZTE ZXV10 H108L Router with <= V1.0.01_WIND_A01 - Remote root RCE Exploit☆52Updated 9 years ago
- Rootkit tutorial code for the Beneath C Level blog - http://beneathclevel.blogspot.co.uk/☆21Updated 12 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Updated 10 years ago
- This is an updated version of Dendroid with a working panel & APK, I hope that everyone enjoys this download.☆41Updated 11 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 10 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Some source code snippets In my development.☆27Updated 3 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 9 years ago
- Some kernel exploit i wrote☆76Updated 10 years ago
- ☆48Updated 9 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Updated 12 years ago
- On the fly TCP and UDP network fuzzer☆16Updated 6 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 8 years ago
- Create a DDOS attack using SNMP servers☆44Updated 11 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 5 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 9 years ago
- Open source exploit framework made in C#☆54Updated 11 months ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 10 years ago