Wi-Fi Covert Channel Chat demo application
☆72Sep 20, 2017Updated 8 years ago
Alternatives and similar repositories for WiFi_CCC
Users that are interested in WiFi_CCC are comparing it to the libraries listed below
Sorting:
- PoC presentada en CyberCamp 2018 para crear una shell mediante tramas 802.11☆23Nov 29, 2018Updated 7 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Attacks against weak 802.11 Random Number Generators☆24Feb 8, 2017Updated 9 years ago
- A extension for collecting parameters☆25Oct 25, 2020Updated 5 years ago
- Eureka is a forensic open source search tool that identifies specific structures in very, very large files (mostly, in memory dumps).☆19Mar 21, 2024Updated last year
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- async web crawler☆31Jun 13, 2014Updated 11 years ago
- ☆60Mar 28, 2020Updated 5 years ago
- Pastebin API wrapper for Python☆18Mar 8, 2025Updated last year
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Jul 29, 2013Updated 12 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Recordization library☆11Feb 27, 2026Updated 2 weeks ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- ☆110May 14, 2018Updated 7 years ago
- Tools for attacking various MIFARE RFID cards☆16Jun 21, 2019Updated 6 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Public work for CVE-2019-0708☆291Nov 19, 2019Updated 6 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- ROM dump of the MYK82 chip in a Fortezza Card. Successor to the Clipper Chip.☆14Jul 28, 2024Updated last year
- pwntools for go!☆22Feb 27, 2019Updated 7 years ago
- ☆13Apr 17, 2018Updated 7 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- The plan is to have a replacement for psexec☆32Aug 15, 2018Updated 7 years ago