☆16Sep 6, 2017Updated 8 years ago
Alternatives and similar repositories for ivr-pentest
Users that are interested in ivr-pentest are comparing it to the libraries listed below
Sorting:
- Advanced Infrastructure Penetration Testing, published by Packt☆29Jan 30, 2023Updated 3 years ago
- OASAM is the acronym of Open Android Security Assessment Methodology and its purpose is to become a reference framework on Android applic…☆85Apr 11, 2022Updated 3 years ago
- SCTP implementation (before jSS7 moved to Netty)☆26Jan 9, 2024Updated 2 years ago
- Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)☆35May 1, 2018Updated 7 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Jul 17, 2013Updated 12 years ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 5 months ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆32Jun 2, 2024Updated last year
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- Asterisk AGI script to use SVOX Pico TTS in dialplans.☆10Sep 3, 2018Updated 7 years ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- Scripts to extract files from SCM directories left on web servers☆36Jun 19, 2023Updated 2 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆40Jun 3, 2021Updated 4 years ago
- Parse Bluetooth Low Energy peripheral advertising packets☆14Nov 7, 2021Updated 4 years ago
- ☆10Feb 28, 2023Updated 3 years ago
- Awesome projects and tools for TIBCO BusinessWorks☆11Mar 9, 2021Updated 5 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- A powerful proxy checker that checks and evaluates proxies for speed, availability, and anonymity across multiple protocols (HTTP, HTTPS,…☆12Oct 31, 2025Updated 4 months ago
- BLEBoy is a training tool to teach users about BLE security by providing a single BLE peripheral that can be used to experiment with each…☆46Oct 25, 2019Updated 6 years ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- My solution of tasks of course "DAT208x Introduction to Python for Data Science"☆11Dec 29, 2016Updated 9 years ago
- Dial Plan Vizualizer module for FreePBX☆13May 27, 2025Updated 9 months ago
- simple tool for finding javascript files from webapps☆10Apr 20, 2023Updated 2 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Official Implementation of implicit reference attack☆11Oct 16, 2024Updated last year
- ☆10May 30, 2015Updated 10 years ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- TBD - The Tmux Bash Debugger☆12Oct 23, 2024Updated last year
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- PoC code for CVE-2019-14041☆13Apr 15, 2020Updated 5 years ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- A script to build a Docker image for a DNN Platform website☆10Feb 8, 2018Updated 8 years ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆30Nov 10, 2025Updated 3 months ago
- Smart contracts for a home rental network with IoT doorlocks☆11Jun 5, 2018Updated 7 years ago