marcoschwartz / arduino-secret-agents
Code for the Arduino for the Secret Agents book
☆13Updated 9 years ago
Alternatives and similar repositories for arduino-secret-agents:
Users that are interested in arduino-secret-agents are comparing it to the libraries listed below
- Scapy Penetration testing scripts☆22Updated 9 years ago
- Weape-Wireless-EAP-Extractor☆27Updated 11 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- ☆20Updated 8 years ago
- Creating a wireless rifle de-authentication gun, which utilized a yagi antenna and a Raspberry Pi.☆67Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Bluetooth Recon Script☆24Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆12Updated 8 years ago
- Exploits and research stuffs☆54Updated last year
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 8 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆106Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Some simple and useful tools☆15Updated 6 years ago
- My collection of dockerfiles☆24Updated 9 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- SlyPI☆18Updated 11 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 9 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Metasploit Usage Wiki☆48Updated 9 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Suite for Information gathering☆12Updated 6 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago