Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications
☆926Nov 27, 2015Updated 10 years ago
Alternatives and similar repositories for bunny
Users that are interested in bunny are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a 802.11 wireless fuzzer☆94Jan 25, 2013Updated 13 years ago
- USB armory: open source flash-drive-sized computer☆11Dec 8, 2015Updated 10 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Easily inject code into OS X apps☆63Oct 1, 2013Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Some NSE scripts to search information from routers☆36Nov 30, 2015Updated 10 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 4 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆368Dec 14, 2014Updated 11 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 12 years ago
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆261Aug 6, 2016Updated 9 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- Tools for Cellular Exploitation on a Global Scale - Blackhat USA 2014☆24Feb 12, 2018Updated 8 years ago
- Exploits and research stuffs☆54Jan 19, 2026Updated 4 months ago
- XSS Weaponization☆34Sep 23, 2013Updated 12 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- transparent TCP-to-proxy redirector☆16Dec 8, 2019Updated 6 years ago
- Python script for querying the apple servers for the location of wifi access points☆14May 31, 2024Updated last year
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- MagTool is software for magnetic stripe readers & writers.☆14Jan 22, 2013Updated 13 years ago
- Hackup of pifm fm transmitter for rpi☆26Dec 12, 2012Updated 13 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Oct 3, 2021Updated 4 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Regular expression Search on the command-line☆16Mar 31, 2025Updated last year
- Sample code for working with OpenSSL, LibP11, engine_pkcs11, and OpenSC☆24May 12, 2013Updated 13 years ago
- PowerShell HTTP(s) Intercepting Proxy☆14Sep 30, 2014Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Explore the Electron APIs☆13Jun 2, 2016Updated 9 years ago
- Ring3 Rootkit Backdoor.☆42Jul 20, 2015Updated 10 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Mar 15, 2013Updated 13 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- Soundcard RFID decoder for 125KHZ HID cards.☆27Apr 2, 2016Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 12 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆140Jul 26, 2022Updated 3 years ago
- An open source, embedded, high performance g-code-parser and CNC milling controller written in optimized C that will run on a straight Ar…☆10Jan 7, 2016Updated 10 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago