Wi-Fi Covert Channel Chat demo application
☆72Sep 20, 2017Updated 8 years ago
Alternatives and similar repositories for WiFi_CCC
Users that are interested in WiFi_CCC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC presentada en CyberCamp 2018 para crear una shell mediante tramas 802.11☆23Nov 29, 2018Updated 7 years ago
- Attacks against weak 802.11 Random Number Generators☆25Feb 8, 2017Updated 9 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- ☆13May 16, 2019Updated 6 years ago
- Wi-Fi CTF Generator application for Raspberry Pi hardware☆24Apr 27, 2018Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Public work for CVE-2019-0708☆296Nov 19, 2019Updated 6 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- ☆60Mar 28, 2020Updated 6 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- ☆110May 14, 2018Updated 7 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- Virtual scenario for Network Penetration Testing☆14Mar 19, 2017Updated 9 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Pastebin API wrapper for Python☆18Mar 8, 2025Updated last year
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- autopwn + deployment☆15Apr 13, 2022Updated 4 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Oct 21, 2019Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- A simple embedded Linux backdoor.☆198Oct 25, 2020Updated 5 years ago
- pwntools for go!☆22Feb 27, 2019Updated 7 years ago
- Linux rust keylogger☆17Mar 1, 2024Updated 2 years ago
- The plan is to have a replacement for psexec☆32Aug 15, 2018Updated 7 years ago
- Eureka is a forensic open source search tool that identifies specific structures in very, very large files (mostly, in memory dumps).☆19Mar 21, 2024Updated 2 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Recordization library☆11Apr 8, 2026Updated 3 weeks ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Apr 6, 2021Updated 5 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year