picoflamingo / hacking_codesLinks
Collection of Security Related Examples for Learning Purposes
☆13Updated 10 years ago
Alternatives and similar repositories for hacking_codes
Users that are interested in hacking_codes are comparing it to the libraries listed below
Sorting:
- IRC-based mass router scanner/exploiter - The project is no longer maintained.☆89Updated 9 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- Dorker, programa utilizado para automatizar pesquisas em buscadores, faz uso de alguns filtros.☆16Updated 10 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- WPS scan and pwn tool☆70Updated 6 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆38Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 6 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- Wi-Fi Backdoors☆42Updated 10 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- Linux rootkit and detection examples☆32Updated 10 years ago
- Modification and tools for using hostapd for rogue AP attacks impersonating WPA-Enterprise networks to steal user credentials☆40Updated 7 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 10 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 9 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Updated 11 years ago
- ☆19Updated 10 years ago
- A modular distributed penetration testing tool.☆41Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Updated 9 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆50Updated 9 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- ☆54Updated 8 years ago
- Collection of Praetorian solutions to CTF challenges☆25Updated 7 years ago
- Open source exploit framework made in C#☆54Updated last year
- ☆20Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 10 years ago