redcode-labs / RedMark
Our fork of Iceman's fork for Proxmark III
☆15Updated 2 months ago
Alternatives and similar repositories for RedMark:
Users that are interested in RedMark are comparing it to the libraries listed below
- ST25TB / SRx NFC Emulator / Initiator - kameleon - based on TI TRF7970A with MSP430☆12Updated 7 months ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Mr. Radar is a port security evading, discovery device used to detect network switches connected to lone network ports.☆12Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- visually see issues with supported cipher suites☆16Updated 8 months ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 3 years ago
- A custom SentinelOne USB scanner.☆18Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 7 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆17Updated 2 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆10Updated last month
- Data EXfiltration TestER☆21Updated 5 years ago
- Free Email Providers☆10Updated last year
- ☆17Updated last year
- A way to force your wifi-pineapple to use SSL☆12Updated 7 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 3 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- Rubber Ducky powered by NeoKey☆22Updated 9 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Legba recipes.☆48Updated 6 months ago