Wi-Fi Covert Channel Chat demo application
☆72Sep 20, 2017Updated 8 years ago
Alternatives and similar repositories for WiFi_CCC
Users that are interested in WiFi_CCC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC presentada en CyberCamp 2018 para crear una shell mediante tramas 802.11☆23Nov 29, 2018Updated 7 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- ☆13May 16, 2019Updated 7 years ago
- Wi-Fi CTF Generator application for Raspberry Pi hardware☆24Apr 27, 2018Updated 8 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Public work for CVE-2019-0708☆293Nov 19, 2019Updated 6 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- ☆60Mar 28, 2020Updated 6 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- ☆110May 14, 2018Updated 8 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 4 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆165Oct 21, 2019Updated 6 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- pwntools for go!☆22Feb 27, 2019Updated 7 years ago
- Linux rust keylogger☆17Mar 1, 2024Updated 2 years ago
- The plan is to have a replacement for psexec☆32Aug 15, 2018Updated 7 years ago
- Eureka is a forensic open source search tool that identifies specific structures in very, very large files (mostly, in memory dumps).☆19Mar 21, 2024Updated 2 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Recordization library☆11Apr 8, 2026Updated last month
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆258Apr 6, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- Web-based Android debugger with inspection capabilities using Frida and Jadx as a backbone☆34Jun 4, 2023Updated 2 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 7 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆18Mar 2, 2020Updated 6 years ago
- ☆34Apr 18, 2020Updated 6 years ago