tomasz-lisowski / simuraiLinks
☆236Updated last year
Alternatives and similar repositories for simurai
Users that are interested in simurai are comparing it to the libraries listed below
Sorting:
- Bluetooth Security Assessment Methodology☆147Updated last week
- A 5G Sniffer and Downlink Injector Framework on steroids... And yes, Wireshark supported!!!☆266Updated this week
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆62Updated last year
- ☆59Updated 6 years ago
- Collection of my Security Blueprints & Guides☆51Updated 3 months ago
- Wireless Hacking Devices Protocol client☆275Updated this week
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆94Updated 4 months ago
- Integrate LLM models directly into Ghidra for automated code rewrite and analysis.☆224Updated last month
- CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled☆148Updated last month
- exploits for CVE-2024-20017☆139Updated last year
- Application Fuzzing: Tools, Techniques, and Best Practices☆174Updated last year
- RF-modulated high fidelity laser microphone and keystroke sniffer☆85Updated last year
- ☆131Updated 2 years ago
- ☆108Updated 11 months ago
- Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet☆73Updated last year
- Hardware Hacking Cheatsheet infograph☆157Updated last year
- Hack-A-Sat Qualifiers Writeups☆259Updated 3 years ago
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆66Updated last year
- Detect code obfuscation through text classification in the detection process.☆45Updated last year
- 🚀 A powerful multi-platform RF toolbox that deploys specialized radio tools in seconds on Linux, Windows, and macOS—supporting x86_64, A…☆269Updated this week
- MITM Field Manual☆368Updated last week
- Code associated with the talk "Blue2thprinting (blue-[tooth)-printing]: answering the question of 'WTF am I even looking at?!'"☆68Updated this week
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆83Updated last month
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆104Updated last year
- Deluder is a tool for intercepting traffic of proxy unaware applications. Currently, Deluder supports OpenSSL, GnuTLS, SChannel, WinSock …☆209Updated 2 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆68Updated 2 weeks ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆32Updated 9 months ago
- CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/S…☆156Updated this week
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆78Updated 2 weeks ago
- Collection of USB hacking links and materials for my talk on the topic☆367Updated 4 months ago