Wi-Fi Covert Channel Chat demo application
☆72Sep 20, 2017Updated 8 years ago
Alternatives and similar repositories for WiFi_CCC
Users that are interested in WiFi_CCC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC presentada en CyberCamp 2018 para crear una shell mediante tramas 802.11☆23Nov 29, 2018Updated 7 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Wi-Fi CTF Generator application for Raspberry Pi hardware☆24Apr 27, 2018Updated 7 years ago
- Starter Kit: Hardware Hacking☆16Jan 15, 2021Updated 5 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Public work for CVE-2019-0708☆296Nov 19, 2019Updated 6 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- ☆60Mar 28, 2020Updated 6 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- ☆110May 14, 2018Updated 7 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- Tools for attacking various MIFARE RFID cards☆17Jun 21, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆179Sep 11, 2023Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Oct 21, 2019Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- A simple embedded Linux backdoor.☆200Oct 25, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago
- pwntools for go!☆22Feb 27, 2019Updated 7 years ago
- Linux rust keylogger☆17Mar 1, 2024Updated 2 years ago
- Eureka is a forensic open source search tool that identifies specific structures in very, very large files (mostly, in memory dumps).☆19Mar 21, 2024Updated 2 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Recordization library☆11Updated this week
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Apr 6, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- BlueKeep powershell scanner (based on c# code)☆39Nov 11, 2019Updated 6 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 6 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago