mnemonic-no / ScapySMSLinks
Complete SMS packet manipulation
☆114Updated 4 years ago
Alternatives and similar repositories for ScapySMS
Users that are interested in ScapySMS are comparing it to the libraries listed below
Sorting:
- Wireshark Profiles for SS7, Diameter & GTP☆26Updated 11 months ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆58Updated 3 years ago
- A Voip Wardialer for the phreaking of 2020☆55Updated last year
- SS7 Attack Simulator based on RestComm's jss7☆102Updated 2 years ago
- ☆71Updated 4 months ago
- THC "R U There" network discovery tool☆29Updated 5 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated 2 years ago
- WireBug is a toolset for Voice-over-IP penetration testing☆173Updated 3 years ago
- Clone network interface from one host as a tap interface on another host☆61Updated 5 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆87Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆94Updated 3 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆94Updated 3 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- USB testing made easy☆119Updated 2 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- A simple and scalable Android bot emulation framework, as presented at Black Hat Europe 2021's Arsenal, as well as atHack 2021's Arsenal☆28Updated 4 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Updated 5 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆56Updated 2 years ago
- Research tools developed for Intel Wi-Fi chips☆56Updated 7 months ago
- Low Interaction Mobile Honeypot☆96Updated 6 months ago
- My favorite resources and tools for malware analysis.☆42Updated 5 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆77Updated last year
- Repository for the Framing Frames publication: security context and transmit queue manipulations, client isolation bypasses, and more.☆47Updated 2 years ago
- Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation☆46Updated 3 years ago