tomasz-lisowski / simuraiLinks
☆199Updated 10 months ago
Alternatives and similar repositories for simurai
Users that are interested in simurai are comparing it to the libraries listed below
Sorting:
- Bluetooth Security Assessment Methodology☆131Updated last year
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆59Updated 8 months ago
- Collection of my Security Blueprints & Guides☆49Updated 2 weeks ago
- ☆123Updated last year
- ☆57Updated 5 years ago
- BrutDroid — Android Emulator Automation Toolkit☆173Updated 2 weeks ago
- Application Fuzzing: Tools, Techniques, and Best Practices☆166Updated 9 months ago
- Hack-A-Sat Qualifiers Writeups☆251Updated 2 years ago
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆120Updated this week
- exploits for CVE-2024-20017☆137Updated 9 months ago
- Wireless Hacking Devices Protocol client☆195Updated this week
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆194Updated last week
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆81Updated 2 weeks ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆52Updated 11 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆272Updated last year
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆65Updated 3 weeks ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆158Updated 7 months ago
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.☆235Updated 2 months ago
- ☆93Updated 5 months ago
- Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class…☆273Updated 11 months ago
- A full-featured open-source Wi-Fi fuzzer☆190Updated last month
- A monster cheatsheet on MITM attacks☆360Updated 3 weeks ago
- A collection of Cyber Threat Intelligence information gathered from the depths of the clearnet, deep web and dark web.☆137Updated 3 weeks ago
- Search engine for CTF writeups with instant results.☆144Updated 3 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆114Updated last year
- LLM tool to find any potential vulnerabilities in android apps and deobfuscate android app code.☆128Updated this week
- ☆84Updated 11 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆289Updated 2 years ago
- RF-modulated high fidelity laser microphone and keystroke sniffer☆74Updated 8 months ago