nfirvine / croy-shark
Clash Royale protocol dissector for Wireshark
☆15Updated 8 years ago
Alternatives and similar repositories for croy-shark:
Users that are interested in croy-shark are comparing it to the libraries listed below
- A graphical multiplatform tool to manipulate and forward TCP connections.☆12Updated 13 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 8 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 7 years ago
- Network white noise collector☆18Updated 9 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Proof Of Concept for inserting code in ELF binaries.☆26Updated 11 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 11 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Osmocom SS7 stack, with Shadytel modifications.☆18Updated 12 years ago
- Creating a reverse shell that works on multiple POSIX platforms☆8Updated 9 years ago
- A tool to extract code from individual functions in a library.☆16Updated 4 months ago
- Perl library for SHODAN☆17Updated 11 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆20Updated 15 years ago
- LibreSSL with a backdoor in RSA key generation☆16Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- An open radio protocol for transmitting UAV flight data in real time.☆11Updated 7 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- A strcmp timing attack example☆9Updated 10 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- Out-of-tree module for GNU Radio containing a complete OFDM implementation including GUI for reasearch and teaching☆17Updated 7 years ago
- libnet provides a portable framework for low-level network packet construction.☆14Updated 6 years ago
- ☆13Updated 7 years ago
- 802.11 radiotap and MPDU parser☆14Updated 7 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- GNURadio GRC files, Arduino code and scripts for preforming attacks on iSmartAlarm systems.☆21Updated 7 years ago
- Scripts to interact with your Lego Dimensions pad☆9Updated last year