☆60Aug 5, 2019Updated 6 years ago
Alternatives and similar repositories for Awesome-Cellular-Hacking
Users that are interested in Awesome-Cellular-Hacking are comparing it to the libraries listed below
Sorting:
- ☆22Jan 12, 2024Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated last month
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- RFM69 ISM Transceiver driver for esp-idf☆11Feb 27, 2026Updated last week
- Antenna analyzer based on RigExpert Zero II and Arduino☆13Jan 25, 2024Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- GitOSINT: The OSINT Powerhouse for Discord. The go-to Discord bot for Open Source Intelligence (OSINT).☆107Aug 24, 2023Updated 2 years ago
- ☆33Apr 23, 2023Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated last year
- ☆13Apr 8, 2021Updated 4 years ago
- ☆16Apr 13, 2025Updated 10 months ago
- Helping you delete your old accounts☆86Aug 23, 2023Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- DC540 hacking challenge 0x00005b.☆16Nov 26, 2025Updated 3 months ago
- ☆14Mar 20, 2025Updated 11 months ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆200Aug 1, 2025Updated 7 months ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- awesome resources about 5G security 🐿☆17Dec 22, 2021Updated 4 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Dec 26, 2023Updated 2 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- Python package containing root-finding methods written in Cython☆22Oct 13, 2023Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Mar 24, 2020Updated 5 years ago
- ☆47Jan 25, 2024Updated 2 years ago
- Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible☆45Oct 29, 2025Updated 4 months ago
- ☆52Feb 8, 2024Updated 2 years ago
- ☆20Sep 24, 2025Updated 5 months ago
- A utility to quickly map IP addresses to their respective ASN☆20Aug 26, 2023Updated 2 years ago
- Single channel LoRaWan gateway for ESP8266/ESP32 using Semtech SX1262 LoRa module☆23Nov 3, 2023Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 3 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Nov 21, 2024Updated last year