nccgroup / dapr
Driver Attack Platform for Linux
☆18Updated 2 years ago
Alternatives and similar repositories for dapr:
Users that are interested in dapr are comparing it to the libraries listed below
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Updated 4 years ago
- ☆27Updated 5 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Our fork of Iceman's fork for Proxmark III☆16Updated 3 months ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆106Updated 10 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- String or worldlist encoder for use in fuzzing or web application testing☆18Updated 5 years ago
- Provides access to libhashcat☆30Updated 11 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Periodically check hashcat cracking progress and notify of success.☆11Updated 6 years ago
- List of Red Team Repositories☆17Updated 6 years ago
- A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆32Updated 5 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆14Updated 7 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 7 years ago
- Wireshark Profiles for SS7, Diameter & GTP☆24Updated last month
- ARP Man-in-the-Middle tool☆29Updated 3 months ago
- Standardizing Security Titles☆13Updated 2 years ago
- A script to automate the creation of cloud infrastructure for hash cracking.☆16Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago