SigFramework it's a modified version of SiGploit
☆21Jan 19, 2026Updated 2 months ago
Alternatives and similar repositories for SigFramework
Users that are interested in SigFramework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Nov 22, 2020Updated 5 years ago
- Crack your non-rooted android device pin code with 100% guarantee aslong as usb debugging has been enable. Wbruter also has support for p…☆15Aug 4, 2019Updated 6 years ago
- ☆12Jun 2, 2021Updated 4 years ago
- ESP32 Test (Arduino IDE - Platformio). This code tests the main functionalities of ESP32 microcontroller.☆13Oct 17, 2024Updated last year
- 📚 本仓库是冰河重现Log4j远程过程执行漏洞的代码示例,完整重现了Log4j最新远程过程执行漏洞,如果对你有所帮助,请给个大大的Star,谢谢啦!!☆11May 29, 2022Updated 3 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Jul 15, 2022Updated 3 years ago
- SMPP client library☆15Mar 17, 2026Updated last week
- ☆296Feb 8, 2022Updated 4 years ago
- Website for ETHBerlin 3☆14Feb 12, 2026Updated last month
- Covers the Arsenal for the BlackHat☆14Jan 16, 2026Updated 2 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Python Script to Parse Phone # and E-mails from Websites☆10Mar 23, 2022Updated 4 years ago
- SS7 Assessment Tool☆256Nov 14, 2022Updated 3 years ago
- DUST ATTACK blockchain transaction with confirmation of isomorphism for a total amount of 10000 BTC☆11Mar 11, 2026Updated last week
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆13Dec 7, 2022Updated 3 years ago
- Tool for searching information via Telegram, Number Phone and Username.☆32Apr 30, 2025Updated 10 months ago
- ADB logcat: Options, Filters & More☆25Mar 3, 2023Updated 3 years ago
- Fragging SS7 for fun and profit☆20Nov 3, 2021Updated 4 years ago
- ☆13Dec 15, 2024Updated last year
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- TRON (TRX) ADDRESS and Private Key Wallet Generated and Cracked with Check From List Data with TRONAPI☆12Nov 21, 2022Updated 3 years ago
- Telegrip is a digital forensic tool that provides acquistion and analysis for Telegram-related cases.☆19May 11, 2022Updated 3 years ago
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated last year
- RobotScraper is a simple tool written in Python to check each of the paths found in the robots.txt file and what HTTP response code they …☆14Jul 23, 2024Updated last year
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- Web scraping is simply the process of using a social media web scraper to gather data automatically. It saves users time, effort and some…☆17Nov 6, 2021Updated 4 years ago
- Implement Frey-Rück Attack to get the secret key “K” (NONCE) / Critical vulnerability in the Bitcoin☆13Dec 7, 2022Updated 3 years ago
- Elliptic curve mathematics including Tate and Weil pairings for BLS signatures and zk-SNARK algorithms.☆21Feb 24, 2025Updated last year
- OSINT Intelligence for different areas ( useful for different type of investigations and learning etc)☆14May 20, 2020Updated 5 years ago
- Sms spoof☆10Feb 19, 2026Updated last month
- Download Samsung firmware from official servers (replacement for SamFirm / Frija)☆11Mar 19, 2021Updated 5 years ago
- Table of common WiFi router SSIDs with their corresponding router model, WPA key examples, keyspace, format and default web interface cre…☆13Mar 15, 2022Updated 4 years ago
- It is a simple javascript app for painting☆15Jun 24, 2020Updated 5 years ago
- Generate Random Reset Instagram URLs and check if they still valid for a complete account takeover☆12Apr 26, 2022Updated 3 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- Linux images for Samsung Galaxy Tab 2 (unified) 7.0 10.0☆10Sep 20, 2022Updated 3 years ago
- Check data breaches for Full Name, Passwords, Phone Number, Email Address, IP Address, Password Hashes - and create reports to include al…☆52Jun 17, 2024Updated last year
- ☆11Jun 8, 2022Updated 3 years ago
- Libro sulla consapevolezza della sicurezza informatica, scritto in italiano e totalmente in creative commons☆17Jan 27, 2026Updated last month