saleemrashid / evilrouterloginView external linksLinks
Proof of Concept for Netgear Routerlogin.com exploit
☆17Feb 9, 2020Updated 6 years ago
Alternatives and similar repositories for evilrouterlogin
Users that are interested in evilrouterlogin are comparing it to the libraries listed below
Sorting:
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- const fn implementation of the SHA-2 family of hash functions☆17Oct 17, 2023Updated 2 years ago
- A GETTR API client written in Python.☆13Jul 14, 2021Updated 4 years ago
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro ho…☆15Feb 19, 2016Updated 9 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- OWASP Foundation Web Respository☆20Mar 15, 2021Updated 4 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆60Dec 15, 2025Updated 2 months ago
- Simple Client-Server Chat Application using Python Sockets☆19Feb 21, 2018Updated 7 years ago
- a collection of elf file infectors☆27Oct 10, 2021Updated 4 years ago
- Hostile Dropboxes Management☆26Jan 8, 2020Updated 6 years ago
- SSH spreading made easy for red teams in a hurry☆57Jan 1, 2024Updated 2 years ago
- Python3 Metasploit automation library☆23Dec 8, 2022Updated 3 years ago
- ☆12May 13, 2020Updated 5 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Things i do because i saw it on twitter on a weekend☆58Jul 20, 2025Updated 6 months ago
- executing JS from x86 code☆27May 9, 2019Updated 6 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- POC viruses I have created to demo some ideas☆59Apr 12, 2020Updated 5 years ago
- Metasploit module for massive Denial of Service using #Bluekeep vector.☆25Oct 1, 2019Updated 6 years ago
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- Lists of AMSI triggers (VBA, JScript / VBScript)☆33Jun 28, 2019Updated 6 years ago
- But actually for hackers☆31Mar 29, 2020Updated 5 years ago
- Windows Stagers to circumvent restrictive network environments☆68Sep 23, 2024Updated last year
- A Linux Kernel that can be booted on GoPro Hero2/Hero3 cameras☆31May 18, 2016Updated 9 years ago
- (Relocated) 3d weaponry from across the globe☆10Jan 24, 2021Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- ☆32May 26, 2025Updated 8 months ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Mar 5, 2021Updated 4 years ago
- Extended Process List (Search functionality)☆29Jan 23, 2021Updated 5 years ago
- A subdomain reconnaissance scanner☆36Dec 8, 2022Updated 3 years ago
- iOS Swift starter app integrated with Yubico SDK for iOS☆33Aug 29, 2019Updated 6 years ago
- Demos and presentation from SECArmy Village Grayhat 2020☆37Mar 15, 2023Updated 2 years ago
- Ratnet is a prototype anonymity network for mesh routing and embedded scenarios.☆214May 5, 2022Updated 3 years ago
- WhatsCloud is an android app which allows you to analyze your WhatsApp chat history on the fly with only one click☆12Jul 29, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago