spectrum monitoring system for GSM providers
☆44Jan 10, 2016Updated 10 years ago
Alternatives and similar repositories for GSM-scanner
Users that are interested in GSM-scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- tests to see if your internal network is susceptible to MiM attacks. do not use on networks you do not own.☆15Apr 12, 2016Updated 9 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Apr 14, 2016Updated 9 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- Broken web app intentionally built with pentesting obstacles☆15Jun 21, 2019Updated 6 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Mar 26, 2016Updated 9 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆119Apr 2, 2018Updated 7 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Sep 13, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- ksfinder - Retrieve exported kernel symbols from physical memory dumps☆48Sep 28, 2016Updated 9 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- Helper script for working with format string bugs☆57May 2, 2020Updated 5 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- lte security☆42Nov 17, 2015Updated 10 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Android anti-root detection Proof of Concept☆44May 9, 2015Updated 10 years ago
- Overwrite C/C++ functions in memory for x86-32/64 on Linux, Mac & Windows☆15Jun 12, 2023Updated 2 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- ☆11Apr 30, 2015Updated 10 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Public resources NB shares☆18Mar 7, 2016Updated 10 years ago
- An evolving hacking framework written in python☆11Jan 11, 2015Updated 11 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year