ortegaalfredo / kscopeLinks
☆153Updated 8 years ago
Alternatives and similar repositories for kscope
Users that are interested in kscope are comparing it to the libraries listed below
Sorting:
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 9 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 8 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆318Updated 6 years ago
- WiFi Tracker Confuser☆64Updated 8 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆93Updated 10 years ago
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆185Updated last year
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆927Updated 10 years ago
- Linux Memory Cryptographic Keys Extractor☆239Updated 2 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 8 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆124Updated 12 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 8 years ago
- IP Over QR Code Tunnel☆199Updated 9 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- A powerful and extensible wireless drop box☆267Updated 7 years ago
- Visual reverse engineering tool.☆284Updated 9 years ago
- a grep -r for secrets☆179Updated 3 years ago
- ☆352Updated 4 years ago
- BitErrant☆59Updated 8 years ago
- Python/Linux port of Psychson, a tool to modify firmware of Phison 2251-03 aka 2303 (BadUSB)☆15Updated 9 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Wolves Among the Sheep☆147Updated 2 years ago
- ☆472Updated last year
- Malicious USB☆176Updated 2 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- Small and cheap standalone USB sanitizer☆44Updated 4 years ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆157Updated 6 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆84Updated 11 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
- Database of private SSL/SSH keys for embedded devices☆269Updated last year