mnemonic-no / ScapySMSLinks
Complete SMS packet manipulation
☆114Updated 4 years ago
Alternatives and similar repositories for ScapySMS
Users that are interested in ScapySMS are comparing it to the libraries listed below
Sorting:
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Updated 4 years ago
- SS7 Attack Simulator based on RestComm's jss7☆104Updated 2 years ago
- ☆72Updated 5 months ago
- Clone network interface from one host as a tap interface on another host☆61Updated 5 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 4 years ago
- Wireshark Profiles for SS7, Diameter & GTP☆26Updated 11 months ago
- WireBug is a toolset for Voice-over-IP penetration testing☆174Updated 3 years ago
- THC "R U There" network discovery tool☆30Updated 5 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Updated 5 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated last week
- USB testing made easy☆120Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- A Voip Wardialer for the phreaking of 2020☆56Updated last year
- Docker Implementation for srsRANProject☆41Updated 3 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆94Updated 3 years ago
- ☆16Updated last year
- Repository for the IPvSeeYou talk at Black Hat 2021☆87Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 5 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- A BurpSuite extension to parse 5GC NF OpenAPI 3.0 files to assess 5G core networks☆76Updated 4 years ago
- Low Interaction Mobile Honeypot☆96Updated 7 months ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Updated 3 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- QEMU setup for emulating satellite firmware for Hack-A-Sat final event☆94Updated 3 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 months ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 5 years ago