kevin2600 / RFIDler-HID26-BruteForce
Proof of Concept of HID26 Bruteforce
☆27Updated last year
Related projects: ⓘ
- Automatic backdooring apk with meterpreter (PoC)☆50Updated 8 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 8 years ago
- Peach Fuzzer Web Frontend☆52Updated 3 years ago
- On the fly TCP and UDP network fuzzer☆16Updated 4 years ago
- Universal Plug and Fuzz☆41Updated 5 years ago
- Free KeyLogger for Kali Linux and Ubuntu☆34Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆69Updated 10 years ago
- EQGRP-Free-Files here.,☆45Updated 8 years ago
- Some NSE scripts to search information from routers☆37Updated 8 years ago
- Proof-of-Concept code for exploits☆82Updated 8 years ago
- This is an updated version of Dendroid with a working panel & APK, I hope that everyone enjoys this download.☆43Updated 10 years ago
- ☆15Updated this week
- Linux tool used to extract sensitive data, inject backdoor or drop remote shells on android devices.☆107Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Wifi Pineapple - Repository, Issue tracker, Wiki☆42Updated 12 years ago
- ☆32Updated this week
- A tool for enumerating the effective privileges of processes on an Android device.☆51Updated 10 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆45Updated 8 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- Windows Crypt API hook to generate weak keys☆47Updated 7 years ago
- ☆54Updated this week
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- Purposely Vulnerable Embedded Device☆21Updated 7 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆34Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 7 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆31Updated 2 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 8 years ago
- ☆12Updated this week
- A few ZigBee Tools to compliment KillerBee☆52Updated 8 years ago