rednaga / compromised-keys
repo with compromised keys and such
☆21Updated 2 years ago
Alternatives and similar repositories for compromised-keys:
Users that are interested in compromised-keys are comparing it to the libraries listed below
- Vulnerability Reports by Aleph Research☆36Updated last year
- Find useful stuff in pastebin☆23Updated 12 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53Updated 11 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Updated 7 years ago
- SNMP Backdoor Communication Channel☆16Updated 13 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 10 years ago
- Security Advisories and Researches☆16Updated 10 years ago
- ☆10Updated 7 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆17Updated 9 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Framework for static and dynamic analysis in Android APKs☆32Updated 7 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 8 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Updated 6 years ago
- Software exploitation training material☆15Updated 7 years ago
- OWASP Droid10 is an opensource handheld system based (android) web application pen testing tool. It can scan for web application vulnera…☆17Updated 3 years ago
- ☆18Updated last year
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Updated 5 years ago