ulissescastro / boss-detector
Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.
☆13Updated 10 years ago
Alternatives and similar repositories for boss-detector:
Users that are interested in boss-detector are comparing it to the libraries listed below
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- ☆15Updated 8 years ago
- darm - intelligent network sniffer for the masses darm is an attempt to create a very easy to use app that will sniff and report informa…☆29Updated 11 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- Burp suite HTTP history advanced search☆11Updated 7 years ago
- Extract hashes and plain passwords from Dump Monitor tweet☆43Updated 9 years ago
- Build a search engine from nmap XML files☆20Updated 10 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 3 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 10 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆45Updated 11 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- (◍•﹏•) - Hi, I'm Eve☆21Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago