nicholasaleks / Awesome-Drone-HackingLinks
A list of awesome drone hacking tools & resources.
β30Updated 2 months ago
Alternatives and similar repositories for Awesome-Drone-Hacking
Users that are interested in Awesome-Drone-Hacking are comparing it to the libraries listed below
Sorting:
- Meteorology reports and forecasts, satellite pass predictions, communications decoding, and imagery analysis for NOAA satellites π§ π° π‘β18Updated 2 years ago
- Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providiβ¦β300Updated 3 weeks ago
- This is a simple bash script to fix errors with apt update, upgrade MetaSploit and run some upgrades to improve the system usability withβ¦β103Updated last year
- β22Updated 11 months ago
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!β49Updated last year
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance πΈβ52Updated 10 months ago
- Files for Aerospace Cybersecurity: Satellite Hacking Workshopβ45Updated last year
- Distributed Signal Intelligence Platformβ90Updated last week
- β190Updated 5 months ago
- Framework for Monitoring File Ingestion Source for Yara Matchesβ50Updated 7 months ago
- Bluetooth Security Assessment Methodologyβ135Updated last year
- BusPwn V1.0 is a powerful Modbus hacking framework designed for testing and exploiting vulnerabilities in Modbus-based systems commonly fβ¦β24Updated 5 months ago
- Dredging up secrets from the depths of the file systemβ130Updated 11 months ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling supportβ29Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, loginβ¦β57Updated 2 months ago
- FT3: Fraud Tools, Tactics, and Techniques Frameworkβ91Updated 2 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post messβ¦β79Updated 4 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.β70Updated last week
- Knowledge base on cybercriminal concealment techniquesβ78Updated 5 months ago
- β22Updated 6 months ago
- β196Updated 9 months ago
- Files and Programs for UAV and Drone Cybersecurity Workshopβ34Updated 2 years ago
- A tool for mapping cyber crimeβ154Updated 5 months ago
- A repository of credential stealer formatsβ227Updated 4 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.β198Updated last week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the β¦β71Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unliβ¦β40Updated 3 months ago
- Apple BLE proximity pairing message spoofingβ19Updated 2 years ago
- β125Updated 4 months ago
- Red Team AI promptsβ35Updated this week