walletfail / bloomburgularLinks
A super micro fun implant
☆23Updated 6 years ago
Alternatives and similar repositories for bloomburgular
Users that are interested in bloomburgular are comparing it to the libraries listed below
Sorting:
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Magnetic stripe spoofer implementing audio waves.☆39Updated 8 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC…☆45Updated 6 years ago
- ANWI - All New Wireless IDS☆28Updated 6 years ago
- The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. To support our project, buy it here: https://shop.kaspe…☆14Updated 6 years ago
- A shellcode testing harness.☆70Updated last year
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆32Updated 9 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Upload this sketch to any Arduino and break into millions of Onity hotel locks worldwide. DC (coaxial) barrel connector required. For mor…☆22Updated 7 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Updated 8 years ago
- ☆47Updated 5 years ago
- Remote shell/exfiltration using keyboard leds.☆26Updated 8 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- Leaked Mirai Source Code - make it vagrantized☆29Updated 4 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Openssh backdoor found with a ssh honeypot☆28Updated 9 years ago
- A collection of crackmes☆40Updated 7 months ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- Trying to hack into keyboards☆86Updated 6 years ago
- ☆20Updated 9 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago