nelenkov / Santoku-LinuxLinks
Linux Distro for Mobile Security, Malware Analysis, and Forensics
☆16Updated 10 years ago
Alternatives and similar repositories for Santoku-Linux
Users that are interested in Santoku-Linux are comparing it to the libraries listed below
Sorting:
- SIM Card tunnel for Alcatel OT-918D☆37Updated 10 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 13 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 9 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆106Updated 11 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- repo with compromised keys and such☆23Updated 2 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Updated last year
- ☆11Updated 11 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 8 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆22Updated 3 years ago
- UPnP hacking scripts and tools☆76Updated 8 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆17Updated 14 years ago
- Bluetooth PIN and LINK-KEY Cracker☆50Updated 11 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- ☆29Updated 5 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆20Updated 2 years ago
- ☆28Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 10 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- ☆23Updated 11 years ago