rednaga / compromised-keysLinks
repo with compromised keys and such
☆21Updated 2 years ago
Alternatives and similar repositories for compromised-keys
Users that are interested in compromised-keys are comparing it to the libraries listed below
Sorting:
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆17Updated 9 years ago
- Vulnerability Reports by Aleph Research☆36Updated last year
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- A while back antirez, in a post to Bugtraq, detailed a new Tcp portscan method.☆16Updated 8 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆52Updated 7 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- Cryptocurrencies related Security resources☆14Updated 2 years ago
- ☆20Updated 9 years ago
- Software exploitation training material☆15Updated 7 years ago
- Check All APK's -- scripts for checking your phone for malware☆30Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- An Android wrapper for Arc☆11Updated 7 years ago
- ☆10Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- My metasploit modules☆23Updated 9 years ago
- FUD Metasploit Android Payload☆11Updated 9 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 7 years ago
- ☆12Updated 10 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 9 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 10 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago