vanhoefm / blackhat17-pocs
Proof of concepts of attacks against Wi-Fi implementations
☆140Updated 6 years ago
Alternatives and similar repositories for blackhat17-pocs:
Users that are interested in blackhat17-pocs are comparing it to the libraries listed below
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆113Updated 9 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆123Updated 6 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 10 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 6 years ago
- ☆89Updated 7 years ago
- A JBoss script for obtaining remote shell access☆172Updated 4 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- ☆90Updated 3 months ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆161Updated 5 years ago
- ☆92Updated 6 years ago
- Script to generate malicious debian packages (debain trojans).☆118Updated 6 years ago
- Shodan HQ nmap plugin - passively scan targets☆153Updated 9 years ago
- Extract Sense out of Gibberish stuff☆82Updated 7 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 7 years ago
- Universal Plug and Fuzz☆41Updated 5 years ago
- Detect and prevent KRACK attacks in your network☆181Updated 7 years ago
- VOIP Security Audit Framework☆108Updated 7 years ago
- myBFF - a Brute Force Framework☆140Updated last month
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆143Updated 9 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆78Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- An automated SMB relay exploitation script.☆154Updated 8 years ago