nfirvine / croy-sharkLinks
Clash Royale protocol dissector for Wireshark
☆15Updated 8 years ago
Alternatives and similar repositories for croy-shark
Users that are interested in croy-shark are comparing it to the libraries listed below
Sorting:
- An ELF parasite command injector.☆34Updated 8 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Attacks against weak 802.11 Random Number Generators☆24Updated 8 years ago
- An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the…☆67Updated 9 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- (◍•﹏•) - Hi, I'm Eve☆21Updated 7 years ago
- ☆65Updated 9 years ago
- Perform obscure ip lookup for online skype accounts. Can find local and remote ip address. Require craked SkypeKit with deobfuscated debu…☆142Updated 13 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- A collection of crackmes☆40Updated 9 months ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- Attacking WPA/WPA encrypted access point without client.☆50Updated 11 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- Bus Pirate (cross-platform, cleaned up for OS X)☆44Updated 10 years ago
- Network white noise collector☆19Updated 9 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.☆50Updated 3 years ago
- NAT Pinning exploit tool for penetration testers.☆35Updated 11 years ago
- simple scripts to parse and patch Microsoft fitness band firmware update file☆13Updated last year
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Linux Runtime Process Injection Tool☆61Updated 12 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 10 years ago
- A Python / Scapy implementation of the OR (TOR) protocol.☆98Updated 4 years ago
- A multi service threaded MD5 cracker☆66Updated 9 years ago
- An educational Linux Kernel Rootkit☆33Updated 4 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 13 years ago