scanakci / DolphinAttackLinks
☆13Updated 8 years ago
Alternatives and similar repositories for DolphinAttack
Users that are interested in DolphinAttack are comparing it to the libraries listed below
Sorting:
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Updated 6 years ago
- A few ZigBee Tools to compliment KillerBee☆55Updated 9 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 5 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- lulz: automated webstalking tool☆54Updated 9 years ago
- Bluetooth PIN and LINK-KEY Cracker☆53Updated 11 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- Scripts to clone CA certificates for use in HTTPS client attacks.☆35Updated 5 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- Map 2G/3G/4G and more cellular networks in real live with a simple smart phone, pretty much like osmocomBB monitoring feature.☆108Updated 2 years ago
- Main repository to pull all Cisco related projects.☆16Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆33Updated 3 years ago
- A collection of crackmes☆41Updated last year
- Some code snapshot that can be used to craft your own tool/exploit☆12Updated 10 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆33Updated 9 years ago
- NSA Playset implant for bridging airgaps without radio☆17Updated 10 years ago
- Search Nmap and Metasploit scanning scripts.☆54Updated 8 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 6 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 6 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 5 years ago
- This package allows interaction with nRF24LU1+ based dongles and the RFStorm firmware.☆23Updated 6 years ago
- File transfer via DNS☆76Updated 8 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Updated 13 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆24Updated 8 years ago
- A smart jamming proof of concept for mobile equipments that could be powered with Modmobmap tool☆100Updated 5 years ago