tomasz-lisowski / simuraiLinks
☆215Updated last year
Alternatives and similar repositories for simurai
Users that are interested in simurai are comparing it to the libraries listed below
Sorting:
- ☆57Updated 6 years ago
- Collection of my Security Blueprints & Guides☆51Updated last month
- Bluetooth Security Assessment Methodology☆133Updated last year
- exploits for CVE-2024-20017☆139Updated 11 months ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G LTE Routers☆73Updated this week
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆60Updated 10 months ago
- A 5G Sniffer and Downlink Injector Framework on steroids... And yes, Wireshark supported!!!☆150Updated this week
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆201Updated 10 months ago
- Application Fuzzing: Tools, Techniques, and Best Practices☆167Updated 11 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 4 months ago
- Wireless Hacking Devices Protocol client☆222Updated this week
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆209Updated 2 weeks ago
- Hardware Hacking Cheatsheet infograph☆154Updated last year
- Hack-A-Sat Qualifiers Writeups☆254Updated 2 years ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆98Updated last year
- ☆125Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated 2 years ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆131Updated 2 months ago
- A monster cheatsheet on MITM attacks☆364Updated 2 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆201Updated 5 months ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆75Updated 10 months ago
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket pattern☆92Updated last week
- This repository contains a few leaked files of HookBot.☆105Updated 2 years ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- 🕵️ Email osint tool☆62Updated 2 years ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆52Updated last year
- Capture screenshots of onion services on an onion service.☆71Updated last year
- All-sources tool to search websites by favicons☆170Updated 9 months ago
- 🛠️ Ultimate Hardware Hacking Guide | IoT security, embedded systems, UART/SPI analysis, and hardware reverse engineering☆28Updated last month
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆52Updated 9 months ago