yosriayed / GSM-scanner
spectrum monitoring system for GSM providers
☆44Updated 9 years ago
Alternatives and similar repositories for GSM-scanner:
Users that are interested in GSM-scanner are comparing it to the libraries listed below
- ☆20Updated 8 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- ☆74Updated 2 years ago
- Exploit Reliability Testing System☆34Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- ☆15Updated 8 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆29Updated 8 years ago
- Wireless Reconnaissance And Intelligent Target Harvesting☆48Updated 8 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- ☆27Updated 7 years ago
- TCP session interception and injection framework☆56Updated 13 years ago
- A shell / chat bot for XMPP and cloud services☆48Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- ANWI - All New Wireless IDS☆27Updated 5 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆28Updated 9 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- ☆25Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 11 years ago
- ☆14Updated 5 years ago