winterwolf32 / Awesome-Cellular-Hacking
☆55Updated 5 years ago
Related projects: ⓘ
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- POC for hikivison devices based on the following vulnerability https://www.exploit-db.com/exploits/44328☆46Updated 6 months ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆99Updated last year
- WiFi Rubber Ducky with a web interface using CircuitPython☆37Updated 2 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆75Updated 9 months ago
- Bluetooth Security Assessment Methodology☆106Updated 3 months ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆83Updated 7 months ago
- Resources, repos and scripts for pentesters and bug bounty.☆55Updated last week
- HikvisionExploiter is a Python-based utility designed to automate exploitation and directory accessibility checks on Hikvision network ca…☆45Updated last month
- Burp Suite extension that makes your life easier by tucking the headers out of the way, so you can see the body content right away withou…☆35Updated 10 months ago
- HardeningMeter is an open-source Python tool carefully designed to comprehensively assess the security hardening of binaries and systems.☆56Updated 2 months ago
- Visualize BBOT scans in realtime with VivaGraphJS☆20Updated last week
- Cloud Exploit Framework☆112Updated 2 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆84Updated this week
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- APK Infrastructure Investigator☆63Updated last year
- Hardware Hacking Cheatsheet infograph☆140Updated 7 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 6 months ago
- A command-line utility for performing reverse DNS lookups☆57Updated last year
- ☆41Updated last year
- A repository with informtion related to Cloud Osint☆72Updated 6 months ago
- Tools used for Pentesting☆22Updated last year
- Automate Scoping, OSINT and Recon assessments.☆89Updated 2 weeks ago
- Check IP addresses against known cloud provider IP address ranges☆43Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆18Updated last year
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆46Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆144Updated 3 months ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆47Updated 10 months ago