robertdavidgraham / krackipsLinks
☆12Updated 8 years ago
Alternatives and similar repositories for krackips
Users that are interested in krackips are comparing it to the libraries listed below
Sorting:
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 11 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 9 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 5 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Updated 7 years ago
- A non-math, but still technical, guide to cryptography☆24Updated 5 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Updated 11 years ago
- Simple examples of integrating the Lua scripting language into C programs.☆24Updated 7 years ago
- A proxy server for cookie sidejacking. Works with 'ferret'.☆56Updated 9 years ago
- LD_PRELOAD rootkit utils☆16Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 5 years ago
- Parses DNS responses in a secure, rigorous manner☆22Updated 5 years ago
- ☆22Updated 2 years ago
- SSH Based Remote Administration Tool☆103Updated 10 years ago
- (◍•﹏ •) - Hi, I'm Eve☆21Updated 7 years ago
- Clickjacking Proof-of-Concept Exploit☆25Updated 5 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- drivesploit-testing☆26Updated 15 years ago
- NMAP Patches and NSE Scripts☆19Updated 12 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
- ☆16Updated 9 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 10 months ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Updated 3 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 11 years ago
- The Horrific Omnipotent Rootkit☆23Updated 8 years ago