t-bonds / sigploit_3
☆23Updated 4 years ago
Alternatives and similar repositories for sigploit_3:
Users that are interested in sigploit_3 are comparing it to the libraries listed below
- A Scanner for M3UA protocol to detect Sigtran supporting nodes☆60Updated 6 years ago
- Locating Roaming location of a number, and collecting msisdn and opeartor related infromation (IMSI, HLR GT, MSC GT)☆81Updated 6 years ago
- Wireshark Profiles for SS7, Diameter & GTP☆24Updated last month
- The Nmap Scanner for Telco☆157Updated 6 years ago
- SS7 Attack Simulator based on RestComm's jss7☆92Updated last year
- ☆15Updated 7 years ago
- Docker Implementation for srsRANProject☆37Updated 2 years ago
- Apple wireless research and tools☆17Updated 4 years ago
- ☆14Updated 5 months ago
- Fragging SS7 for fun and profit☆18Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- ARP Man-in-the-Middle tool☆29Updated 3 months ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Head…☆19Updated 5 years ago
- ☆19Updated 7 years ago
- A BurpSuite extension to parse 5GC NF OpenAPI 3.0 files to assess 5G core networks☆75Updated 3 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- The most complete and up-to-date repository for BladeRF and YateBTS compatibility☆26Updated last year
- some scripts to get imsi with gsm☆16Updated 8 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- Find infected ms17-010 machines☆12Updated 7 years ago
- Force target victim to unsafe network☆19Updated last week
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Updated 9 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- ☆16Updated last year
- find where an image is taken☆18Updated 2 years ago
- botnet scanner written in python☆8Updated 6 years ago
- An exploit for an XSS and RCE vulnerability in the GoAhead webserver for embedded devices.☆18Updated 3 years ago
- Mobile phone PWN tools and scripts☆14Updated 4 years ago