marcoschwartz / arduino-secret-agentsLinks
Code for the Arduino for the Secret Agents book
☆13Updated 9 years ago
Alternatives and similar repositories for arduino-secret-agents
Users that are interested in arduino-secret-agents are comparing it to the libraries listed below
Sorting:
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- ☆20Updated 9 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- Sensor software☆68Updated 3 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆49Updated 9 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- SlyPI☆20Updated 12 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆68Updated 9 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 8 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆12Updated 9 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆43Updated 4 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆115Updated 9 years ago
- Automatic backdooring apk with meterpreter (PoC)☆51Updated 8 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 6 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Updated 6 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- Bluetooth Recon Script☆24Updated 9 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- ☆47Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- PoC tool to demonstrate vulnerabilities in wireless input devices☆87Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago