kwestin / applerazorLinks
initial upload
☆19Updated 10 years ago
Alternatives and similar repositories for applerazor
Users that are interested in applerazor are comparing it to the libraries listed below
Sorting:
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆141Updated 3 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- A web spider's worst nightmare.☆54Updated 13 years ago
- A centralized location for all presentations I've given at various conferences☆26Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆929Updated 10 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- A Github organization reconnaissance tool.☆218Updated 2 years ago
- Reticle is a C&C network for small devices that want to be friends.☆90Updated 11 years ago
- Script for turning a Raspberry Pi into a Honey Pot Pi☆35Updated last year
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 13 years ago
- ☆75Updated 10 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- ☆63Updated 9 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆104Updated 9 years ago
- Stargate☆96Updated 9 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆150Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Transparent network tap☆122Updated 10 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.☆178Updated 5 years ago
- ☆198Updated 9 years ago
- ☆148Updated 9 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆60Updated 6 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- ☆208Updated 7 years ago
- Take full control of a OSX user or root account via command line.☆100Updated 7 years ago
- Automatically exported from code.google.com/p/sergio-proxy☆51Updated 10 years ago