kimocoder / miranda
Miranda UPNP Tool
☆9Updated 8 months ago
Alternatives and similar repositories for miranda:
Users that are interested in miranda are comparing it to the libraries listed below
- Some stuff about telecom security☆14Updated 8 years ago
- Linksys Smart Wi-fi X-JNAP-Action Sensitive Information Disclosure for EA8500 router and potentially others☆19Updated 3 years ago
- USBNinja Android Remote Control Application☆29Updated 5 years ago
- Example packet.proxy plugins.☆22Updated 4 years ago
- Linux tool for sniffing smartcard communication between card and reader using season interface.☆39Updated 5 months ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- Firmware images for BCM33xx modems☆10Updated 6 months ago
- Binary and Static Releases☆13Updated 9 months ago
- ☆69Updated 6 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- ☆10Updated 7 years ago
- ☆27Updated 3 years ago
- The ChromeCast Exploitation Kit☆37Updated last year
- ☆17Updated 4 years ago
- Cable modem firmware dump☆40Updated 9 years ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆9Updated 6 years ago
- BlackArch configuration for the bash shell.☆12Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- ☆39Updated 3 years ago
- Leveraging CWMP (CPE WAN Management Protocol) to extract vendor specific secrets and configurations from CPEs☆12Updated 5 years ago
- A tool for recover router password☆29Updated 6 years ago
- A collection of random 802.11 tools☆11Updated 10 months ago
- vyos based isolation of networks☆11Updated 4 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 2 years ago
- ☆20Updated 3 years ago
- SimBrush - SIM data carver and wrapper☆20Updated 13 years ago
- Tools for attacking various MIFARE RFID cards☆14Updated 5 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆22Updated 3 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- ☆15Updated 7 years ago