rednaga / compromised-keysLinks
repo with compromised keys and such
☆22Updated 2 years ago
Alternatives and similar repositories for compromised-keys
Users that are interested in compromised-keys are comparing it to the libraries listed below
Sorting:
- Vulnerability Reports by Aleph Research☆36Updated last year
- ☆10Updated 7 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆53Updated 7 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- SIM Card tunnel for Alcatel OT-918D☆37Updated 10 years ago
- Linux Distro for Mobile Security, Malware Analysis, and Forensics☆17Updated 9 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- Some NSE scripts to search information from routers☆10Updated 9 years ago
- Generic exploit for master key vulnerability in Android☆33Updated 10 years ago
- This repository contains various shell scripts and tips and tricks used for packaging androidtamer packages☆12Updated 2 years ago
- An Android wrapper for Arc☆11Updated 7 years ago
- Scripts and tools for ISM hacking☆15Updated 7 years ago
- Mobile phone PWN tools and scripts☆15Updated 4 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆32Updated 7 years ago
- ☆28Updated 9 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- Fork of iSec Partners Android Intent Fuzzer (https://www.isecpartners.com/tools/mobile-security/intent-fuzzer.aspx)☆15Updated 10 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- hostapd-mana for the 6.th gen. Wifi Pineapple, and OpenWRT☆22Updated 3 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- hcidump for android☆10Updated 10 years ago
- PoC Exploiting Permission Bypass in Android's Download Provider (CVE-2018-9468)☆20Updated 5 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Tools and scripts dedicated to Android application security☆50Updated 4 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago