ortegaalfredo / kscopeLinks
☆153Updated 8 years ago
Alternatives and similar repositories for kscope
Users that are interested in kscope are comparing it to the libraries listed below
Sorting:
- International Journal of Proof-of-Concept or Get The F*** Out (PoC||GTFO or PoC or GTFO)☆185Updated last year
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 7 years ago
- WiFi Tracker Confuser☆64Updated 8 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 8 years ago
- Don't Skype & Type! Keyboard acoustic eavesdropping tool.☆317Updated 6 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated 2 years ago
- Funtenna P0C code demonstrated at Blackhat 2015☆93Updated 10 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- IP Over QR Code Tunnel☆199Updated 8 years ago
- An entropy generator using SDR peripherals, including rtl-sdr and BladeRF☆360Updated 4 years ago
- ☆50Updated 9 years ago
- Visual reverse engineering tool.☆283Updated 8 years ago
- Just a simple radare2 Jupyter kernel☆111Updated 7 years ago
- A sketch to use an ESP8266 to flood the surrounding area with SSIDs of your choosing.☆45Updated 8 years ago
- ☆470Updated 11 months ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
- Small and cheap standalone USB sanitizer☆44Updated 4 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- hid emulation tools for the usbarmory☆68Updated 8 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago
- RF retroreflectors☆100Updated 9 years ago
- ☆352Updated 4 years ago
- Database of private SSL/SSH keys for embedded devices☆266Updated last year
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- ☆480Updated last week
- Time Trial - A tool for performing feasibility analyses of timing attacks☆83Updated 11 years ago
- Wolves Among the Sheep☆147Updated 2 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆929Updated 9 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆123Updated 12 years ago