virtualabs / Ndh15Badge-libraryLinks
Arduino library for the Nuit du Hack 2015 Badge
☆13Updated 9 years ago
Alternatives and similar repositories for Ndh15Badge-library
Users that are interested in Ndh15Badge-library are comparing it to the libraries listed below
Sorting:
- An attacker-oriented library for the Teensy 3.1 microcontroller.☆44Updated 11 years ago
- Rogue AP killer☆91Updated 8 years ago
- A python application designed to remotely dump RAM of a Linux client and create a volatility profile for later analysis on your local hos…☆158Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Updated 7 years ago
- ☆86Updated 10 years ago
- Gets in the way of your victim's traffic and out of yours☆27Updated 6 years ago
- A Python framework for script filing and task sequencing☆26Updated 6 years ago
- Checks for PATH substitution vulnerabilities and logs the commands executed by the vulnerable executables☆51Updated 9 years ago
- Easy 802.1Q VLAN Hopping☆80Updated last year
- Concierge Toolkit: Physical Access Control Identification and Exploitation☆118Updated 7 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- SMTP server / sinkhole for collecting spam☆46Updated 7 years ago
- The knife of the Admin & Security auditor☆42Updated 6 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- WARCARRIER RF Scanning Terminal with Advanced Logging Features☆60Updated 7 years ago
- ☆93Updated 7 years ago
- This is the Command & Control component of the PlugBot project☆102Updated 3 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 8 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆89Updated 8 years ago
- Creates dictionaries based on Wikipedia titles☆63Updated 6 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- Stargate☆96Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- This device silently hunts its prey, swooping in to gather RFID cards.☆33Updated 3 years ago
- Because I can't find scripts to do this anywhere else...☆26Updated 9 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 10 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 10 years ago
- Writeups for CTF that took place in 2015.☆13Updated 9 years ago