teambi0s / Wall-of-Shame
A framework for capturing user credentials and sensitive device information.
☆64Updated last year
Alternatives and similar repositories for Wall-of-Shame:
Users that are interested in Wall-of-Shame are comparing it to the libraries listed below
- The Reverse Engineering Assistant of your dreams☆31Updated 3 years ago
- Telco training☆26Updated 6 years ago
- Tools and scripts dedicated to Android application security☆49Updated 4 years ago
- All files for the InCTF 10th Edition Hardware Badge☆19Updated 4 years ago
- Content related to hardware hacking☆51Updated 6 years ago
- Public exploits (re)writed while learning.☆12Updated 11 years ago
- Python - Human Interface Device Android Attack Framework☆36Updated 7 years ago
- Library of Crypto exploits☆9Updated last year
- Starter Kit: Hardware Hacking☆13Updated 4 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 6 years ago
- ☆67Updated 6 months ago
- Simple Karma Attack☆69Updated 4 years ago
- The router hacking repo.☆33Updated 9 years ago
- Simple Wi-Fi Keylogger with multiple layout support.☆27Updated 5 years ago
- Files and challenges for the OSINT workshop including examples☆22Updated 5 years ago
- ☆23Updated 2 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 7 years ago
- Hackmelock emulator device using node.js bleno☆27Updated 7 years ago
- Apple BLE research☆30Updated 5 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- Tool to automate the whole process of environment in android audits☆14Updated 5 years ago
- Hackmelock Android application☆17Updated 8 years ago
- Covert data exfiltration and detection using 802.11 beacon stuffing☆15Updated 5 years ago
- A script for easily building customized images of pentesting distros (Kali and ParrotSec).☆17Updated 4 years ago
- Open source SDR LTE software suite☆19Updated 7 years ago
- Get your USB Rubber Ducky up and running faster☆42Updated 7 years ago
- wifi attacks suite☆59Updated 4 years ago
- Let's brute force this hotel's tv.☆78Updated 5 years ago
- Reverse engineering challenges☆50Updated 5 years ago
- Get clients and access points.☆49Updated 5 years ago