kwestin / applerazorLinks
initial upload
☆19Updated 10 years ago
Alternatives and similar repositories for applerazor
Users that are interested in applerazor are comparing it to the libraries listed below
Sorting:
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆96Updated 13 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 11 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Updated 10 years ago
- usbWatchdog - monitor changes to your usb ports, and if anything is plugged in or removed, wipe RAM and shut down.☆49Updated 8 years ago
- Take full control of a OSX user or root account via command line.☆101Updated 7 years ago
- ☆198Updated 10 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆140Updated 3 years ago
- For importing, searching, and managing public password breach data☆160Updated 2 years ago
- ☆75Updated 10 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- ☆40Updated 9 years ago
- Helper scripts to remaster Linux Live CD images for the purpose of creating ready to use security wargames with pre-installed vulnerabili…☆52Updated 4 years ago
- ☆208Updated 7 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- Script for turning a Raspberry Pi into a Honey Pot Pi☆35Updated last year
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Updated 5 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- Rogue AP killer☆92Updated 8 years ago
- A complete Ruby porting of the ubertooth libraries and utilities.☆22Updated 10 years ago
- Transparent network tap☆122Updated 10 years ago
- A OS X crypto ransomware PoC☆89Updated 10 years ago
- Tools for 802.11 information gathering.☆119Updated 3 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago
- A web spider's worst nightmare.☆54Updated 13 years ago
- ☆147Updated 9 years ago