leonjza / qrxfer
Transfer files from Air gapped machines using QR codes
☆105Updated 3 years ago
Alternatives and similar repositories for qrxfer:
Users that are interested in qrxfer are comparing it to the libraries listed below
- A web spider's worst nightmare.☆51Updated 12 years ago
- Insiderer looks inside files for metadata and hidden content☆37Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Python bindings for hashcat☆58Updated 5 years ago
- A complete Ruby porting of the ubertooth libraries and utilities.☆22Updated 9 years ago
- Rogue AP killer☆89Updated 6 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- Panic button for protection against cold boot attacks☆140Updated 2 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆50Updated 9 years ago
- Password Cracking in the Cloud☆23Updated 6 years ago
- irc bot to scan & bruteforce ssh/telnet☆7Updated 5 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆110Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 7 years ago
- ☆27Updated 7 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 5 years ago
- A powerful and extensible wireless drop box☆265Updated 6 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆60Updated 4 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 8 years ago
- CERT Tapioca for MITM network analysis☆182Updated 8 months ago
- ☆25Updated 7 years ago
- a grep -r for secrets☆176Updated 2 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago