Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications
☆927Nov 27, 2015Updated 10 years ago
Alternatives and similar repositories for bunny
Users that are interested in bunny are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a 802.11 wireless fuzzer☆93Jan 25, 2013Updated 13 years ago
- USB armory: open source flash-drive-sized computer☆11Dec 8, 2015Updated 10 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range☆21Jan 12, 2015Updated 11 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Easily inject code into OS X apps☆63Oct 1, 2013Updated 12 years ago
- Some NSE scripts to search information from routers☆36Nov 30, 2015Updated 10 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- Hijack Putty sessions in order to sniff conversation and inject Linux commands.☆367Dec 14, 2014Updated 11 years ago
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 11 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Mar 5, 2014Updated 12 years ago
- Tools for Cellular Exploitation on a Global Scale - Blackhat USA 2014☆24Feb 12, 2018Updated 8 years ago
- Exploits and research stuffs☆54Jan 19, 2026Updated 2 months ago
- XSS Weaponization☆34Sep 23, 2013Updated 12 years ago
- transparent TCP-to-proxy redirector☆16Dec 8, 2019Updated 6 years ago
- Reading, writing and analysis of magnetic stripe information☆29Oct 13, 2010Updated 15 years ago
- Python script for querying the apple servers for the location of wifi access points☆14May 31, 2024Updated last year
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- MagTool is software for magnetic stripe readers & writers.☆15Jan 22, 2013Updated 13 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Oct 3, 2021Updated 4 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- Sample code for working with OpenSSL, LibP11, engine_pkcs11, and OpenSC☆24May 12, 2013Updated 12 years ago
- PowerShell HTTP(s) Intercepting Proxy☆14Sep 30, 2014Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- Explore the Electron APIs☆13Jun 2, 2016Updated 9 years ago
- Ring3 Rootkit Backdoor.☆42Jul 20, 2015Updated 10 years ago
- An IDA Pro swiss army knife (with a sexy name!)☆56Mar 15, 2013Updated 13 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 13 years ago
- Soundcard RFID decoder for 125KHZ HID cards.☆27Apr 2, 2016Updated 9 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Python participant support for MsgFlo☆13May 23, 2020Updated 5 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- An 802.11 WEP/WPA2 on-the-fly decrypter.☆141Jul 26, 2022Updated 3 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago