kwestin / applerazor
initial upload
☆19Updated 9 years ago
Alternatives and similar repositories for applerazor:
Users that are interested in applerazor are comparing it to the libraries listed below
- A centralized location for all presentations I've given at various conferences☆26Updated 7 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆50Updated 7 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- ☆198Updated 9 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- Advice on how to do computer things securely for non-experts☆59Updated 4 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆57Updated 6 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- A small script to automate project folder management and basic tool output☆35Updated 4 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- Backup scripts I use on my drives.☆25Updated 7 years ago
- ☆31Updated 4 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- My zsh, bash and vim dot files☆68Updated 5 years ago
- A complete Ruby porting of the ubertooth libraries and utilities.☆22Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- ☆39Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 8 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- password cracking front end☆58Updated 4 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Updated 5 years ago
- Take full control of a OSX user or root account via command line.☆99Updated 6 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago