Remote shell/exfiltration using keyboard leds.
☆26Jul 27, 2017Updated 8 years ago
Alternatives and similar repositories for firefly
Users that are interested in firefly are comparing it to the libraries listed below
Sorting:
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15May 23, 2017Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Aug 20, 2017Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆39Sep 28, 2017Updated 8 years ago
- rfcat port for the 900MHz Explorer board☆27Dec 19, 2016Updated 9 years ago
- A pure Ruby library for parsing the XML out of an AndroidManifest.xml stored in an APK package☆16Aug 5, 2016Updated 9 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- BLESuite_CLI is a command line tool to enable an easier way to test Bluetooth Low Energy (BLE) devices☆34Aug 1, 2016Updated 9 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- Raspberry Pi projects☆16Jan 16, 2017Updated 9 years ago
- Arduino Zero toolchain without Arduino IDE (Atmel SAM D21 SAMD21G18A)☆20Feb 25, 2016Updated 10 years ago
- A wearable Sub-GHz RF hacking tool☆123Aug 9, 2019Updated 6 years ago
- Lightweight Natural Intelligence Framework☆19Dec 18, 2016Updated 9 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- Weblogic,CVE-2018-2894☆18Sep 11, 2019Updated 6 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- CableTap public disclosure documents.☆78Jul 29, 2017Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Checkpot Honeypot Checker☆45Jan 20, 2019Updated 7 years ago
- example C code to retrieve the Raspberry Pi Serial Number☆48Jul 6, 2024Updated last year
- Better understand memory behaviour and performance with Node applications☆21Sep 8, 2016Updated 9 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Feb 5, 2016Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- A emulator for ARM programs. Aim to run ARM programs in x86 platform. The project is originally on source forge, at sourceforge.net/proj…☆28Feb 20, 2016Updated 10 years ago
- Fucking Search Engines Scraper - python library to scrap url's from search engines☆49Sep 6, 2017Updated 8 years ago
- ADX POCKET - ARDUINO DIGITAL MODES TRANSCEIVER wit CAT☆29Feb 21, 2024Updated 2 years ago
- a fully python Diffie-Hellman Library☆52Mar 29, 2018Updated 7 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- Easy to use command line security scanner☆58Feb 27, 2016Updated 10 years ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- unix wildcard attacks☆137May 25, 2018Updated 7 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Apr 20, 2020Updated 5 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago