redcode-labs / RedMark
Our fork of Iceman's fork for Proxmark III
☆16Updated 3 months ago
Alternatives and similar repositories for RedMark:
Users that are interested in RedMark are comparing it to the libraries listed below
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆12Updated 7 months ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Free Email Providers☆10Updated last year
- Powerful advanced web platform for C2 managing and automated penetration testing.☆14Updated last year
- Directory with Bluetooth exploits that is used in BlueToolkit☆11Updated last month
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Tools for attacking various MIFARE RFID cards☆15Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- Force target victim to unsafe network☆20Updated last week
- Rubber Ducky powered by NeoKey☆22Updated 9 months ago
- ☆18Updated last year
- ☆13Updated 3 years ago
- ☆11Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- ☆11Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- Legba recipes.☆48Updated 7 months ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18Updated 5 years ago
- BLE based C2 for Hak5's Bash Bunny☆15Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago