t-bonds / sigploit_3Links
☆23Updated 4 years ago
Alternatives and similar repositories for sigploit_3
Users that are interested in sigploit_3 are comparing it to the libraries listed below
Sorting:
- SS7 Attack Simulator based on RestComm's jss7☆98Updated 2 years ago
- A Scanner for M3UA protocol to detect Sigtran supporting nodes☆62Updated 7 years ago
- Locating Roaming location of a number, and collecting msisdn and opeartor related infromation (IMSI, HLR GT, MSC GT)☆83Updated 6 years ago
- The Nmap Scanner for Telco☆163Updated 6 years ago
- ☆18Updated 8 years ago
- A tool for recover router password☆30Updated 7 years ago
- Wireshark Profiles for SS7, Diameter & GTP☆27Updated 5 months ago
- Apple wireless research and tools☆19Updated 5 years ago
- Bluekit is an extensible engine, CLI tool used in BlueToolkit☆11Updated last month
- Docker Implementation for srsRANProject☆40Updated 2 years ago
- A BurpSuite extension to parse 5GC NF OpenAPI 3.0 files to assess 5G core networks☆74Updated 4 years ago
- Complete SMS packet manipulation☆113Updated 3 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆16Updated 6 years ago
- ☆12Updated 8 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆39Updated 2 years ago
- simple script to pwn android phone with physical access☆25Updated 6 years ago
- Mobile phone PWN tools and scripts☆15Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆37Updated 5 years ago
- All Zero Day Exploits☆19Updated 7 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆15Updated last month
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Updated 3 years ago
- Learn the most common Threats in mobile technology, Learn how to build your own IMSI catcher, and more!☆20Updated 2 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆18Updated 2 years ago
- IP range distributed scanner for vulnerable Hikvision cameras☆25Updated 6 years ago
- A dysfunctional framework for software analysis by black hat hackers who intend to develop Cerberus, the malicious banking trojan botnet …☆14Updated 3 years ago
- Packet injection for wifi; simplified.☆36Updated 2 years ago
- find where an image is taken☆18Updated 3 years ago