tomasz-lisowski / simuraiLinks
β197Updated 9 months ago
Alternatives and similar repositories for simurai
Users that are interested in simurai are comparing it to the libraries listed below
Sorting:
- Bluetooth Security Assessment Methodologyβ129Updated last year
- π A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOSβsupporting x86_64, Aβ¦β192Updated 2 weeks ago
- Hack-A-Sat Qualifiers Writeupsβ250Updated 2 years ago
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.β56Updated 7 months ago
- Wireless Hacking Devices Protocol clientβ183Updated this week
- β123Updated last year
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilledβ117Updated 2 months ago
- Application Fuzzing: Tools, Techniques, and Best Practicesβ165Updated 8 months ago
- β57Updated 5 years ago
- LLM tool to find any potential vulnerabilities in android apps and deobfuscate android app code.β122Updated this week
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock β¦β190Updated 8 months ago
- A monster cheatsheet on MITM attacksβ355Updated this week
- Collection of my Security Blueprints & Guidesβ48Updated 2 months ago
- Hardware Hacking Cheatsheet infographβ151Updated last year
- β99Updated 4 months ago
- β82Updated 10 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.β87Updated last week
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.β156Updated 6 months ago
- Cisco IOS Security Inspectorβ31Updated 2 months ago
- RF-modulated high fidelity laser microphone and keystroke snifferβ74Updated 7 months ago
- Search engine for CTF writeups with instant results.β142Updated 2 months ago
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is β¦β200Updated last year
- Your ultimate guide to Hardware Hackingβ20Updated last week
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.β200Updated 2 months ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, aβ¦β97Updated 10 months ago
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.β32Updated 7 months ago
- Strumenti VATINT - Intelligence sui veicoli e sui trasportiβ92Updated 8 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β108Updated 2 months ago
- β95Updated last year
- exploits for CVE-2024-20017β137Updated 8 months ago