vanhoefm / fragattacks
☆1,260Updated last month
Alternatives and similar repositories for fragattacks:
Users that are interested in fragattacks are comparing it to the libraries listed below
- Vulnerability checker for Callstranger (CVE-2020-12695)☆403Updated 3 years ago
- Connect like there is no firewall. Securely.☆1,626Updated this week
- ☆2,493Updated 2 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆798Updated 2 years ago
- HomePwn - Swiss Army Knife for Pentesting of IoT Devices☆893Updated 2 years ago
- Tracking history of USB events on GNU/Linux☆1,162Updated 2 years ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,266Updated 5 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,830Updated 2 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆821Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,382Updated 2 years ago
- SSH-MITM - ssh audits made simple☆1,369Updated last week
- Network Defense System.☆1,469Updated this week
- EMBA - The firmware security analyzer☆2,882Updated this week
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,008Updated 7 months ago
- Network Analysis Tool☆3,198Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,748Updated 2 years ago
- Repository for information about 0-days exploited in-the-wild.☆779Updated last week
- SkySafe Miscellaneous Reverse Engineering Blog☆766Updated last year
- A sniffer for Bluetooth 5 and 4.x LE☆932Updated last month
- OFRAK: unpack, modify, and repack binaries.☆1,930Updated 3 weeks ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,914Updated 2 years ago
- Interactive CTF Exploration Tool☆1,652Updated 3 years ago
- Wi-Fi Exploitation Framework☆2,483Updated 5 months ago
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆954Updated 2 years ago
- IPv6 attack toolkit☆1,064Updated 3 weeks ago
- A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.☆904Updated 5 years ago
- ☆1,336Updated 4 years ago
- ☆518Updated last month
- Next-Gen GUI-based WiFi and Bluetooth Analyzer for Linux☆1,297Updated 7 months ago
- An intelligence gathering tool for hacking Bluetooth☆786Updated last year